General
-
Target
Infected.exe
-
Size
63KB
-
Sample
240306-p2twbsbb2w
-
MD5
23a233a3f2421f84917d70adb4ef6010
-
SHA1
b37531e113f2f15e2f26a3c2019de6da8e5ac0da
-
SHA256
97d7d7503f44c25e525cb9f189c40778cc391aae4d113d47da7d255f3c6168e1
-
SHA512
a30393ae5f6549bf04b729e5ee05130a48dcab98f57703fc2785d44a14466e4e7bd30d2def18552c73c3f4b844466a2ec27ebb2fe2ceeb040935e95e1e8dffba
-
SSDEEP
768:fDILAFjT678p4C8A+XeuazcBRL5JTk1+T4KSBGHmDbD/ph0oXyZy/eqbzSuAdpqM:kqTQJdSJYUbdh9yc/9WuAdpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
asyncrat
test
fl-survivor.gl.at.ply.gg:23531
吾ωΖONh9aLijGΖ吉ΔΔURZy0尺d
-
delay
1
-
install
true
-
install_file
sigma.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
23a233a3f2421f84917d70adb4ef6010
-
SHA1
b37531e113f2f15e2f26a3c2019de6da8e5ac0da
-
SHA256
97d7d7503f44c25e525cb9f189c40778cc391aae4d113d47da7d255f3c6168e1
-
SHA512
a30393ae5f6549bf04b729e5ee05130a48dcab98f57703fc2785d44a14466e4e7bd30d2def18552c73c3f4b844466a2ec27ebb2fe2ceeb040935e95e1e8dffba
-
SSDEEP
768:fDILAFjT678p4C8A+XeuazcBRL5JTk1+T4KSBGHmDbD/ph0oXyZy/eqbzSuAdpqM:kqTQJdSJYUbdh9yc/9WuAdpqKmY7
Score10/10-
Async RAT payload
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1