General
-
Target
trigger.ps1
-
Size
4KB
-
Sample
240401-nslb6adc7s
-
MD5
ea8ca92c75b97b5a230f17abe3e8d468
-
SHA1
f4e89bf49581218812602e8f842ede3a85d662f6
-
SHA256
387815f79581f26a97734a61fd74c6455ef04923016fa6b98a4d2734a3a5b869
-
SHA512
f23e4b5e2ed8fd275c1cb96d55becb6e357c6fd92c354127046957412202a9d121c2f385b804d5f441f7c4e3c921e15d9af89e72b9bfb845443deb54c2a25ff7
-
SSDEEP
96:DEFPSQ/rCJxCl01oo1695OgOvrUUcZifozWHfE3LRJov+TQ35oCQxqeQnh2erLq:DEFRIyo12OgOvrUUcZifozWHfE3LRJok
Static task
static1
Behavioral task
behavioral1
Sample
trigger.vbs
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
trigger.vbs
Resource
macos-20240214-en
Malware Config
Extracted
asyncrat
0.5.8
DllHost
40.66.42.41:3627
iuUHhUUKW3Gv
-
delay
3
-
install
false
-
install_file
DllHost
-
install_folder
%AppData%
Extracted
asyncrat
0.5.8
Widgets
40.66.42.41:9471
wqrJ8tHYR1qw
-
delay
3
-
install
false
-
install_file
Widgets
-
install_folder
%AppData%
Targets
-
-
Target
trigger.ps1
-
Size
4KB
-
MD5
ea8ca92c75b97b5a230f17abe3e8d468
-
SHA1
f4e89bf49581218812602e8f842ede3a85d662f6
-
SHA256
387815f79581f26a97734a61fd74c6455ef04923016fa6b98a4d2734a3a5b869
-
SHA512
f23e4b5e2ed8fd275c1cb96d55becb6e357c6fd92c354127046957412202a9d121c2f385b804d5f441f7c4e3c921e15d9af89e72b9bfb845443deb54c2a25ff7
-
SSDEEP
96:DEFPSQ/rCJxCl01oo1695OgOvrUUcZifozWHfE3LRJov+TQ35oCQxqeQnh2erLq:DEFRIyo12OgOvrUUcZifozWHfE3LRJok
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1