General
-
Target
shl-t2rf-as.py.deob.py.bin.exe
-
Size
352KB
-
Sample
250227-r1rqpa1ky8
-
MD5
98de174aa68f9fcb356262ccdd548861
-
SHA1
ddc3fe9a0bce70a0ca68eec3bd131c78f922a052
-
SHA256
c2c026e601046e29c2ddc4d6608e562a3ab33c869983125ff1faba3e4a46b66c
-
SHA512
369d2723a947a8c163fcccf102ef262dc2237122e291f4f8b74e7a5bc0c11ee8d9615c23cd550b43ec59c254ae58c69680eb41533159b69ea52d2d7f577bdc3d
-
SSDEEP
6144:FFg+5AWj7+B7YqnqbopO6luag+ShMH9O1BNINgKXAsC:Fi+5AWjy7YGXplEDMo7IGKXAV
Static task
static1
Malware Config
Extracted
asyncrat
0.5.7B
Default
ashleyasync.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
shl-t2rf-as.py.deob.py.bin.exe
-
Size
352KB
-
MD5
98de174aa68f9fcb356262ccdd548861
-
SHA1
ddc3fe9a0bce70a0ca68eec3bd131c78f922a052
-
SHA256
c2c026e601046e29c2ddc4d6608e562a3ab33c869983125ff1faba3e4a46b66c
-
SHA512
369d2723a947a8c163fcccf102ef262dc2237122e291f4f8b74e7a5bc0c11ee8d9615c23cd550b43ec59c254ae58c69680eb41533159b69ea52d2d7f577bdc3d
-
SSDEEP
6144:FFg+5AWj7+B7YqnqbopO6luag+ShMH9O1BNINgKXAsC:Fi+5AWjy7YGXplEDMo7IGKXAV
-
Asyncrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-