General
-
Target
windows_shellcode_loader.exe
-
Size
1.8MB
-
Sample
250412-yyq5pszqt8
-
MD5
880a88bc4d6883b288e9fe5991396afc
-
SHA1
f448f7266c97e98fb8fdfa90d33ad775ee8ac3cc
-
SHA256
2437709b8e2f53f242849d6b45ebabd03226ee70d508926746989c368ffc3df7
-
SHA512
16d4014a54a416785fe2d784370a839c4fd56c6bc394f68edea3dc02b9e9bf0891f4f4a286ce874de1e41262a7debdd15ddf3b05d146851c083ac5f2a7bd0a44
-
SSDEEP
49152:a2LkiBtAvvAEF5+sFrguhJ2B+qVIUZKrhpE94IU6i:eFjODFH+
Static task
static1
Malware Config
Extracted
asyncrat
L838 RAT v1.0.0
Default
sfsafqagbiv
-
delay
1
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rVJQPNVe
Targets
-
-
Target
windows_shellcode_loader.exe
-
Size
1.8MB
-
MD5
880a88bc4d6883b288e9fe5991396afc
-
SHA1
f448f7266c97e98fb8fdfa90d33ad775ee8ac3cc
-
SHA256
2437709b8e2f53f242849d6b45ebabd03226ee70d508926746989c368ffc3df7
-
SHA512
16d4014a54a416785fe2d784370a839c4fd56c6bc394f68edea3dc02b9e9bf0891f4f4a286ce874de1e41262a7debdd15ddf3b05d146851c083ac5f2a7bd0a44
-
SSDEEP
49152:a2LkiBtAvvAEF5+sFrguhJ2B+qVIUZKrhpE94IU6i:eFjODFH+
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-