General

  • Target

    tmp

  • Size

    3.0MB

  • Sample

    220823-xx2pdabdb4

  • MD5

    c78c87211562343987baad10eeb70f4a

  • SHA1

    c879b72ee37eac505d6875882e829865f2e542a7

  • SHA256

    20123269b48e6fc150b726295747d0dc9c952b1b0d6d035cb115bbf2e4c249dc

  • SHA512

    48c244c6bc207e030fb2dd62eb96d5499cbd083cd35db01c30ae64809426ad93bbdfd60a7fd355b98092adf3fa838ac33d5fa37a7aaafbf837e281ab5f2f0348

  • SSDEEP

    49152:Y6ERSDB2MA069+8Q1J5o7bovw8Fmkzx1SwSEw8TcbOmmfmJ/o78h948MEGqW6wg5:gEy6Wcmkzx88Tcfm+68h9eE9CS

Malware Config

Targets

    • Target

      tmp

    • Size

      3.0MB

    • MD5

      c78c87211562343987baad10eeb70f4a

    • SHA1

      c879b72ee37eac505d6875882e829865f2e542a7

    • SHA256

      20123269b48e6fc150b726295747d0dc9c952b1b0d6d035cb115bbf2e4c249dc

    • SHA512

      48c244c6bc207e030fb2dd62eb96d5499cbd083cd35db01c30ae64809426ad93bbdfd60a7fd355b98092adf3fa838ac33d5fa37a7aaafbf837e281ab5f2f0348

    • SSDEEP

      49152:Y6ERSDB2MA069+8Q1J5o7bovw8Fmkzx1SwSEw8TcbOmmfmJ/o78h948MEGqW6wg5:gEy6Wcmkzx88Tcfm+68h9eE9CS

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks