General
-
Target
8e84fa4f3e50e2bdc357c348b923a8b4.exe
-
Size
210KB
-
Sample
201129-lrzdvelwhx
-
MD5
8e84fa4f3e50e2bdc357c348b923a8b4
-
SHA1
8ccc6b05df9cd2ab9275e2848a997176b3cd41c8
-
SHA256
0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1
-
SHA512
cab0b936c6834068a94d55a7c3172b3b27766ddd41d5422ec2e4b1f2c0f39fa12f1258c4dc5483f061b635976ce398b91d274fbab812b64657ea3eb06e5dc81c
Static task
static1
Behavioral task
behavioral1
Sample
8e84fa4f3e50e2bdc357c348b923a8b4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8e84fa4f3e50e2bdc357c348b923a8b4.exe
Resource
win10v20201028
Malware Config
Extracted
Language | ps1 |
Source |
|
URLs |
ps1.dropper
http://kfdhsa.ru/asdfg.exe
exe.dropper
http://kfdhsa.ru/asdfg.exe |
Extracted
Language | ps1 |
Source |
|
URLs |
ps1.dropper
http://nicoslag.ru/asdfg.exe
exe.dropper
http://nicoslag.ru/asdfg.exe |
Extracted
Language | ps1 |
Source |
|
URLs |
ps1.dropper
http://bit.do/e5K5i
exe.dropper
http://bit.do/e5K5i |
Extracted
Language | ps1 |
Source |
|
URLs |
ps1.dropper
http://bit.do/e5K4M
exe.dropper
http://bit.do/e5K4M |
Extracted
Language | ps1 |
Source |
|
URLs |
ps1.dropper
http://bit.do/e5K4b
exe.dropper
http://bit.do/e5K4b |
Extracted
Language | ps1 |
Source |
|
URLs |
ps1.dropper
http://bratiop.ru/asdfg.exe
exe.dropper
http://bratiop.ru/asdfg.exe |
Extracted
Family |
raccoon |
Botnet |
5e4db353b88c002ba6466c06437973619aad03b3 |
Attributes |
url4cnc https://telete.in/brikitiki |
rc4.plain |
|
rc4.plain |
|
Extracted
Family |
azorult |
C2 |
http://195.245.112.115/index.php |
Extracted
Family |
asyncrat |
Version |
0.5.7B |
C2 |
agentttt.ac.ug:6970 agentpurple.ac.ug:6970 |
Attributes |
aes_key 16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr
anti_detection false
autorun false
bdos false
delay Default
host agentttt.ac.ug,agentpurple.ac.ug
hwid 3
install_file
install_folder %AppData%
mutex AsyncMutex_6SI8OkPnk
pastebin_config null
port 6970
version 0.5.7B |
aes.plain |
|
Targets
-
-
Target
8e84fa4f3e50e2bdc357c348b923a8b4.exe
-
Size
210KB
-
MD5
8e84fa4f3e50e2bdc357c348b923a8b4
-
SHA1
8ccc6b05df9cd2ab9275e2848a997176b3cd41c8
-
SHA256
0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1
-
SHA512
cab0b936c6834068a94d55a7c3172b3b27766ddd41d5422ec2e4b1f2c0f39fa12f1258c4dc5483f061b635976ce398b91d274fbab812b64657ea3eb06e5dc81c
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation