General

  • Target

    aa84d648e6f36780d2bd4325458342828a766f02d23ab877d65646f0633fc755

  • Size

    923KB

  • Sample

    230108-175qkaad3z

  • MD5

    3b92e53ea7106ee609a5b4796a5b599b

  • SHA1

    2c7f8a13dfedcb783f519faad02bfbbea345a9e7

  • SHA256

    aa84d648e6f36780d2bd4325458342828a766f02d23ab877d65646f0633fc755

  • SHA512

    8b18b3ba213928cc6ab66f3d506bc98cc2dfef013349326215dc892367129252934fec2e031f7aa27b105734e3fa85f98aebda1f08ac00448f9cfcbc784c6676

  • SSDEEP

    24576:Qy2by81dbZXVioOeddV6nO9LqDoBFw1FYyfSPQqY:X2BTbZlH5daOVqDoBUXC

Malware Config

Targets

    • Target

      aa84d648e6f36780d2bd4325458342828a766f02d23ab877d65646f0633fc755

    • Size

      923KB

    • MD5

      3b92e53ea7106ee609a5b4796a5b599b

    • SHA1

      2c7f8a13dfedcb783f519faad02bfbbea345a9e7

    • SHA256

      aa84d648e6f36780d2bd4325458342828a766f02d23ab877d65646f0633fc755

    • SHA512

      8b18b3ba213928cc6ab66f3d506bc98cc2dfef013349326215dc892367129252934fec2e031f7aa27b105734e3fa85f98aebda1f08ac00448f9cfcbc784c6676

    • SSDEEP

      24576:Qy2by81dbZXVioOeddV6nO9LqDoBFw1FYyfSPQqY:X2BTbZlH5daOVqDoBUXC

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks