b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe

General
Target

b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe

Size

1MB

Sample

201111-efjc1ll17x

Score
10 /10
MD5

6d01213c51ed2570b263b28fa4b9f320

SHA1

aa5aa4142ff6de7e5560424d252c2bf234f14651

SHA256

b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261

SHA512

0ca8354473740c4f6212159f98571eaf3041ea895a3e067b52c9b5e380c948cc5df0fa18171674c35afd5f0bdeb75e676b41a548be1a3e05ed5f7906a8365766

Malware Config

Extracted

Family asyncrat
Version 0.5.7B
C2

agentttt.ac.ug:6970

agentpurple.ac.ug:6970

Attributes
aes_key
16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr
anti_detection
false
autorun
false
bdos
false
delay
Default
host
agentttt.ac.ug,agentpurple.ac.ug
hwid
3
install_file
install_folder
%AppData%
mutex
AsyncMutex_6SI8OkPnk
pastebin_config
null
port
6970
version
0.5.7B
aes.plain

Extracted

Family azorult
C2

http://195.245.112.115/index.php

Targets
Target

b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe

MD5

6d01213c51ed2570b263b28fa4b9f320

Filesize

1MB

Score
10 /10
SHA1

aa5aa4142ff6de7e5560424d252c2bf234f14651

SHA256

b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261

SHA512

0ca8354473740c4f6212159f98571eaf3041ea895a3e067b52c9b5e380c948cc5df0fa18171674c35afd5f0bdeb75e676b41a548be1a3e05ed5f7906a8365766

Tags

Signatures

  • AsyncRat

    Description

    AsyncRAT is designed to remotely monitor and control other computers.

    Tags

  • Azorult

    Description

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    Tags

  • Contains code to disable Windows Defender

    Description

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • ModiLoader, DBatLoader

    Description

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    Tags

  • Modifies Windows Defender Real-time Protection settings

    Tags

    TTPs

    Modify Registry Modify Existing Service Disabling Security Tools
  • Async RAT payload

    Tags

  • ModiLoader First Stage

  • ModiLoader Second Stage

  • Executes dropped EXE

  • Deletes itself

  • Loads dropped DLL

  • Reads user/profile data of local email clients

    Description

    Email clients store some user data on disk where infostealers will often target it.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Windows security modification

    Tags

    TTPs

    Disabling Security Tools Modify Registry
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Drops desktop.ini file(s)

  • JavaScript code in executable

  • Modifies service

    Tags

    TTPs

    Modify Registry Modify Existing Service
  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Discovery
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Privilege Escalation