General
-
Target
AsyncClientee.vbs
-
Size
73KB
-
Sample
250130-k1zyqswqhx
-
MD5
0ec47428f6f4b7cbe56b8c4a927ed64b
-
SHA1
3db2b1d34f94cc5d2cc2838fc156b8ef24c9bf0d
-
SHA256
2e48003da4e90411347ae5e4945ba9b656a25bc32b23744a8d7f7e8931bdbe6e
-
SHA512
0ead059a5174e32bae38c0686c7acda5d88bf5a0ddd3d14f8adef72de08f09a9b92913dc8818f625f0e05d1551c75630f194164a1cedfb2bcc2f3193bf69df87
-
SSDEEP
1536:1AFd4ohVZMj7O9swhsuWlKcWE3ZgKvAVIQSG4523UoZK8sEwB71WXikKL0tXLt:1AFLZMeqwhVcz3ZZAOQSG45+UT8sEs1y
Static task
static1
Behavioral task
behavioral1
Sample
AsyncClientee.vbs
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
| Edit by Vinom Rat
Default
69NK69.LINKPC.NET:6666
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
AsyncClientee.vbs
-
Size
73KB
-
MD5
0ec47428f6f4b7cbe56b8c4a927ed64b
-
SHA1
3db2b1d34f94cc5d2cc2838fc156b8ef24c9bf0d
-
SHA256
2e48003da4e90411347ae5e4945ba9b656a25bc32b23744a8d7f7e8931bdbe6e
-
SHA512
0ead059a5174e32bae38c0686c7acda5d88bf5a0ddd3d14f8adef72de08f09a9b92913dc8818f625f0e05d1551c75630f194164a1cedfb2bcc2f3193bf69df87
-
SSDEEP
1536:1AFd4ohVZMj7O9swhsuWlKcWE3ZgKvAVIQSG4523UoZK8sEwB71WXikKL0tXLt:1AFLZMeqwhVcz3ZZAOQSG45+UT8sEs1y
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Drops file in System32 directory
-