Resubmissions

23-09-2023 06:20

230923-g3294afc74 6

22-09-2023 09:24

230922-ldawrshb83 10

21-09-2023 15:40

230921-s4gwbsha8z 4

19-09-2023 16:03

230919-thpvgscc79 1

19-09-2023 13:37

230919-qw5w3shc6s 10

19-09-2023 13:25

230919-qn8yrsbc63 10

13-09-2023 11:47

230913-nx8m9aeb62 4

12-09-2023 19:11

230912-xv98qshf86 10

12-09-2023 19:03

230912-xqr7cshf46 10

12-09-2023 11:47

230912-nybd5sca41 1

General

  • Target

    https://google.com

  • Sample

    230909-rkhg3sbg35

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

def

C2

37.18.62.18:8060

Mutex

era2312swe12-1213rsgdkms23

Attributes
  • delay

    1

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777

Targets

    • Target

      https://google.com

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • ToxicEye

      ToxicEye is a trojan written in C#.

    • Async RAT payload

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks