General

  • Target

    InvPROV-NTI-EXX-DECK-22-008.exe

  • Size

    292KB

  • Sample

    220128-a7hmxsdccj

  • MD5

    1d142d1d500fdfbe3b7ef592a9a8895a

  • SHA1

    e345c0434b4a276fec0855b8536723cd01466f9c

  • SHA256

    f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25

  • SHA512

    33df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a

Malware Config

Targets

    • Target

      InvPROV-NTI-EXX-DECK-22-008.exe

    • Size

      292KB

    • MD5

      1d142d1d500fdfbe3b7ef592a9a8895a

    • SHA1

      e345c0434b4a276fec0855b8536723cd01466f9c

    • SHA256

      f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25

    • SHA512

      33df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks