b4bc1d711262ca156f8142abfeaee8b4.exe

General
Target

b4bc1d711262ca156f8142abfeaee8b4.exe

Size

739KB

Sample

201119-71bxsateke

Score
10 /10
MD5

b4bc1d711262ca156f8142abfeaee8b4

SHA1

794f7b394bc77b17585d943fef42c814044d94cd

SHA256

2bea53a14d59fc7d772ea805af47b3b8ddddbf201a7e8d9e7ebd7ca422702a30

SHA512

0eb95a8a099d012bfa71e2359ab8e9a1489afc772b9298832d9faa26fe1391f5b668465b2a982738471cea511998101d278d779af7d7b42deee39e84190507c9

Malware Config

Extracted

Family asyncrat
Version 0.5.7B
C2

agentttt.ac.ug:6970

agentpurple.ac.ug:6970

Attributes
aes_key
16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr
anti_detection
false
autorun
false
bdos
false
delay
Default
host
agentttt.ac.ug,agentpurple.ac.ug
hwid
3
install_file
install_folder
%AppData%
mutex
AsyncMutex_6SI8OkPnk
pastebin_config
null
port
6970
version
0.5.7B
aes.plain

Extracted

Family azorult
C2

http://195.245.112.115/index.php

Targets
Target

b4bc1d711262ca156f8142abfeaee8b4.exe

MD5

b4bc1d711262ca156f8142abfeaee8b4

Filesize

739KB

Score
10 /10
SHA1

794f7b394bc77b17585d943fef42c814044d94cd

SHA256

2bea53a14d59fc7d772ea805af47b3b8ddddbf201a7e8d9e7ebd7ca422702a30

SHA512

0eb95a8a099d012bfa71e2359ab8e9a1489afc772b9298832d9faa26fe1391f5b668465b2a982738471cea511998101d278d779af7d7b42deee39e84190507c9

Tags

Signatures

  • AsyncRat

    Description

    AsyncRAT is designed to remotely monitor and control other computers.

    Tags

  • Azorult

    Description

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    Tags

  • Contains code to disable Windows Defender

    Description

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • ModiLoader, DBatLoader

    Description

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    Tags

  • Modifies Windows Defender Real-time Protection settings

    Tags

    TTPs

    Modify Registry Modify Existing Service Disabling Security Tools
  • Raccoon

    Description

    Simple but powerful infostealer which was very active in 2019.

    Tags

  • Async RAT payload

    Tags

  • ModiLoader First Stage

  • Executes dropped EXE

  • Deletes itself

  • Loads dropped DLL

  • Reads user/profile data of local email clients

    Description

    Email clients store some user data on disk where infostealers will often target it.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Windows security modification

    Tags

    TTPs

    Disabling Security Tools Modify Registry
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Drops desktop.ini file(s)

  • JavaScript code in executable

  • Modifies service

    Tags

    TTPs

    Modify Registry Modify Existing Service
  • Suspicious use of SetThreadContext

  • ServiceHost packer

    Description

    Detects ServiceHost packer used for .NET malware

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Discovery
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Privilege Escalation