General
-
Target
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c.vbs
-
Size
6KB
-
Sample
250128-n86m2a1ldr
-
MD5
5cd058a830624c948fcf2e91589e523c
-
SHA1
f3ff01a26d55f8c01dc6d930afc526653164e2fd
-
SHA256
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c
-
SHA512
786773fd9d87fa23680cface7236c349b560c7ad4241624f91a6fd6d6cfc05d7e554555614b93a78a2be8000b2c4e5c1b1fca9a312bd68a77cbab1b38ff23370
-
SSDEEP
96:ej/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/3:8PjGZOmya03D
Static task
static1
Behavioral task
behavioral1
Sample
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c.vbs
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
00000001
81.10.39.58:7077
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c.vbs
-
Size
6KB
-
MD5
5cd058a830624c948fcf2e91589e523c
-
SHA1
f3ff01a26d55f8c01dc6d930afc526653164e2fd
-
SHA256
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c
-
SHA512
786773fd9d87fa23680cface7236c349b560c7ad4241624f91a6fd6d6cfc05d7e554555614b93a78a2be8000b2c4e5c1b1fca9a312bd68a77cbab1b38ff23370
-
SSDEEP
96:ej/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/3:8PjGZOmya03D
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-