General
-
Target
shellcode_loader.exe
-
Size
1.7MB
-
Sample
250413-ajhm1st1fv
-
MD5
7738fc1c644e75954d87e59f607c1dc1
-
SHA1
88797699e2449c749c3cf47b445e1802de3f0d0d
-
SHA256
aa25b09c0498daa80de2a413073b2e12c4dd5da6da775d67ca34622349d91eff
-
SHA512
08b8fdc3c181c7b76ec3b88dc04b7a8f2e73672ceb50743339558259a0a302b9b59704d5828a9f31b6505c5cdfbfcc93dc12a7944e8330ff8f1cafb38dd1ac06
-
SSDEEP
49152:4JbX0Bj7/5I+plh3dfd3hgkc+bVhdk4IU6ia:oG59eH+
Static task
static1
Malware Config
Extracted
asyncrat
L838 RAT v1.0.0
Default
sfsafqagbiv
-
delay
1
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rVJQPNVe
Targets
-
-
Target
shellcode_loader.exe
-
Size
1.7MB
-
MD5
7738fc1c644e75954d87e59f607c1dc1
-
SHA1
88797699e2449c749c3cf47b445e1802de3f0d0d
-
SHA256
aa25b09c0498daa80de2a413073b2e12c4dd5da6da775d67ca34622349d91eff
-
SHA512
08b8fdc3c181c7b76ec3b88dc04b7a8f2e73672ceb50743339558259a0a302b9b59704d5828a9f31b6505c5cdfbfcc93dc12a7944e8330ff8f1cafb38dd1ac06
-
SSDEEP
49152:4JbX0Bj7/5I+plh3dfd3hgkc+bVhdk4IU6ia:oG59eH+
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-