General

  • Target

    aba9ea59aab84849cf371965c19ef46c.exe

  • Size

    88KB

  • Sample

    211021-gm2nmaagcj

  • MD5

    aba9ea59aab84849cf371965c19ef46c

  • SHA1

    366050aca450a5d1ea67ea5b6b1902a60c721c01

  • SHA256

    99988371c15bd38fc947d898dc6eeb0d425c98f7bd471d040c24c8c667bd2b0b

  • SHA512

    f38d27e4a58492a59043cf8ee3df3eb317581f3fb98b59d6d1b32163acc83a403425a554e1974e60c857b3489cf1d49a0e6de8734a9a159fea4d6fe571302248

Malware Config

Targets

    • Target

      aba9ea59aab84849cf371965c19ef46c.exe

    • Size

      88KB

    • MD5

      aba9ea59aab84849cf371965c19ef46c

    • SHA1

      366050aca450a5d1ea67ea5b6b1902a60c721c01

    • SHA256

      99988371c15bd38fc947d898dc6eeb0d425c98f7bd471d040c24c8c667bd2b0b

    • SHA512

      f38d27e4a58492a59043cf8ee3df3eb317581f3fb98b59d6d1b32163acc83a403425a554e1974e60c857b3489cf1d49a0e6de8734a9a159fea4d6fe571302248

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks