General
-
Target
782002e0f8ad2bb96d89bf0404ec3a64668960141afef49c0dd9a226eb80bdf6.ps1
-
Size
453KB
-
Sample
250129-dc4tfs1qel
-
MD5
026927d6f8c95796171f4b5726827317
-
SHA1
02268fbe1e410822d9af6ce9e569818bbbe38f3a
-
SHA256
782002e0f8ad2bb96d89bf0404ec3a64668960141afef49c0dd9a226eb80bdf6
-
SHA512
50268beb68995b83ac689fb9dabd839b758fb7260e626d7fdf492d99325ceca94014b1e97f8c7209f5195cf3a75d4efbb2ccc4d561b10ec73d576f39bd219323
-
SSDEEP
3072:z+PE+NPVFL2bUCUrNlKomLJVlCsspSljq:UE+NPVFL2bUCUrNlKomLJVlCsspSl2
Static task
static1
Behavioral task
behavioral1
Sample
782002e0f8ad2bb96d89bf0404ec3a64668960141afef49c0dd9a226eb80bdf6.ps1
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
00000001
81.10.39.58:7077
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
782002e0f8ad2bb96d89bf0404ec3a64668960141afef49c0dd9a226eb80bdf6.ps1
-
Size
453KB
-
MD5
026927d6f8c95796171f4b5726827317
-
SHA1
02268fbe1e410822d9af6ce9e569818bbbe38f3a
-
SHA256
782002e0f8ad2bb96d89bf0404ec3a64668960141afef49c0dd9a226eb80bdf6
-
SHA512
50268beb68995b83ac689fb9dabd839b758fb7260e626d7fdf492d99325ceca94014b1e97f8c7209f5195cf3a75d4efbb2ccc4d561b10ec73d576f39bd219323
-
SSDEEP
3072:z+PE+NPVFL2bUCUrNlKomLJVlCsspSljq:UE+NPVFL2bUCUrNlKomLJVlCsspSl2
-
Asyncrat family
-
Suspicious use of SetThreadContext
-