General
-
Target
4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf.wsf
-
Size
210KB
-
Sample
250128-n8k2bsxqfy
-
MD5
d282ee245b417b8864b9a1d090b0a3b8
-
SHA1
b529d5b75920ef439ba509fddeb03049976414f4
-
SHA256
4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf
-
SHA512
f94b5c7e3c8b420248d39f2c86b8c3835ea048aaf2e3181802b366a1f17ae1d364fa2d727931f6af88ae46f721bea8ebdad4c939dbbe7917518f74f158a93030
-
SSDEEP
6144:rUFHpUFHpUFHpUFHpUFHpUFHpUFHqUFHpUFHpUFHrUFHpUFHpUFHpUFHB:rUnUnUnUnUnUnUkUnUnUlUnUnUnUT
Static task
static1
Behavioral task
behavioral1
Sample
4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf.wsf
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
00000001
81.10.39.58:7077
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf.wsf
-
Size
210KB
-
MD5
d282ee245b417b8864b9a1d090b0a3b8
-
SHA1
b529d5b75920ef439ba509fddeb03049976414f4
-
SHA256
4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf
-
SHA512
f94b5c7e3c8b420248d39f2c86b8c3835ea048aaf2e3181802b366a1f17ae1d364fa2d727931f6af88ae46f721bea8ebdad4c939dbbe7917518f74f158a93030
-
SSDEEP
6144:rUFHpUFHpUFHpUFHpUFHpUFHpUFHqUFHpUFHpUFHrUFHpUFHpUFHpUFHB:rUnUnUnUnUnUnUkUnUnUlUnUnUnUT
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-