General
-
Target
cc3142e5a57ed925b842b9518b73dd50bf2e670ca954cffcec931adaf2c7f943.wsf
-
Size
259KB
-
Sample
250128-n939asxrct
-
MD5
79615b779cd90313367de9f6b05eb87e
-
SHA1
d4b2b0caffacb205898c6590eb28840933535d97
-
SHA256
cc3142e5a57ed925b842b9518b73dd50bf2e670ca954cffcec931adaf2c7f943
-
SHA512
b07ab709a4431031f7e2e939ff82572accb8bbe6464479c8e9bfc399aec7da233c21f901d9a8d952fe077486c579b1de0d24f1632f96ec1ba39b81f6736fb9db
-
SSDEEP
3072:6XGxpnyPWD4v6V2BBGKBukGl4a3j3iFNj6pWFAc8ytiO8ywbv7r3SopyPCEXQkPK:Rt5M6c/n1x/rzAcfqys28Eq59CY
Static task
static1
Behavioral task
behavioral1
Sample
cc3142e5a57ed925b842b9518b73dd50bf2e670ca954cffcec931adaf2c7f943.wsf
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
00000001
81.10.39.58:7077
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
cc3142e5a57ed925b842b9518b73dd50bf2e670ca954cffcec931adaf2c7f943.wsf
-
Size
259KB
-
MD5
79615b779cd90313367de9f6b05eb87e
-
SHA1
d4b2b0caffacb205898c6590eb28840933535d97
-
SHA256
cc3142e5a57ed925b842b9518b73dd50bf2e670ca954cffcec931adaf2c7f943
-
SHA512
b07ab709a4431031f7e2e939ff82572accb8bbe6464479c8e9bfc399aec7da233c21f901d9a8d952fe077486c579b1de0d24f1632f96ec1ba39b81f6736fb9db
-
SSDEEP
3072:6XGxpnyPWD4v6V2BBGKBukGl4a3j3iFNj6pWFAc8ytiO8ywbv7r3SopyPCEXQkPK:Rt5M6c/n1x/rzAcfqys28Eq59CY
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-