General
-
Target
Invoice 098734543 3.xls
-
Size
66KB
-
Sample
201026-m5qxdhnzcj
-
MD5
a86efdb09b8ec5a298f512459ff8d64d
-
SHA1
17a9506e70c78f7de865af5be040384997bba4cb
-
SHA256
71444376cd428f1934e94d2933197c4f0bfe03019b845a81fdeb922bcae95d7a
-
SHA512
b984f9b55e46861b6233b13e1e88200db7bd43c6c09d95ccd6bda6a189c6cd00b6a30dc94b574d9db0a2cb139ef2f5284ac7a84a580072575341187f225851f0
Static task
static1
Malware Config
Extracted
https://tinyurl.com/y6ak9qcl
Extracted
asyncrat
0.5.7B
185.165.153.249:4371
-
aes_key
4lpLfCzV6wCkayaT0MjD3qp2ZVBd759O
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
185.165.153.249
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
4371
-
version
0.5.7B
Targets
-
-
Target
Invoice 098734543 3.xls
-
Size
66KB
-
MD5
a86efdb09b8ec5a298f512459ff8d64d
-
SHA1
17a9506e70c78f7de865af5be040384997bba4cb
-
SHA256
71444376cd428f1934e94d2933197c4f0bfe03019b845a81fdeb922bcae95d7a
-
SHA512
b984f9b55e46861b6233b13e1e88200db7bd43c6c09d95ccd6bda6a189c6cd00b6a30dc94b574d9db0a2cb139ef2f5284ac7a84a580072575341187f225851f0
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
ServiceHost packer
Detects ServiceHost packer used for .NET malware
-
Blacklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation