General

  • Target

    tmp

  • Size

    597KB

  • Sample

    221007-w1n21sdcep

  • MD5

    adf266d3870069d9c6ec30091d347f68

  • SHA1

    dc27468702ccd3139f773c72ba64d38d8a50ff07

  • SHA256

    dd44612801b32da18885221e9211c565eecceeef71217b5b9858b839d6f8dc0d

  • SHA512

    cf57167932dde49b92cfcb72ee84dca1df51fe66d2ca2d832488bb4d410fd1f5ed9e0e8755a8fd5de41bb96f0e40fce35fa6c678ff4c794b7077026441ba26cd

  • SSDEEP

    6144:xSyBmqk0G78MNNhrXN8d9sx40RZGI8i6e6jherVXLw1Ig:xSycICXhrMWx/4Iae6VkXUWg

Malware Config

Targets

    • Target

      tmp

    • Size

      597KB

    • MD5

      adf266d3870069d9c6ec30091d347f68

    • SHA1

      dc27468702ccd3139f773c72ba64d38d8a50ff07

    • SHA256

      dd44612801b32da18885221e9211c565eecceeef71217b5b9858b839d6f8dc0d

    • SHA512

      cf57167932dde49b92cfcb72ee84dca1df51fe66d2ca2d832488bb4d410fd1f5ed9e0e8755a8fd5de41bb96f0e40fce35fa6c678ff4c794b7077026441ba26cd

    • SSDEEP

      6144:xSyBmqk0G78MNNhrXN8d9sx40RZGI8i6e6jherVXLw1Ig:xSycICXhrMWx/4Iae6VkXUWg

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Detects Smokeloader packer

    • Modifies WinLogon for persistence

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Email Collection

1
T1114

Tasks