General

  • Target

    LastActivityView.exe

  • Size

    69KB

  • Sample

    240507-pj17paab57

  • MD5

    0f9957e07c58ab3e2870c0e8bf7d872a

  • SHA1

    1a1d98204c0ed2ac1a693ae4fac0127ffbd61425

  • SHA256

    5b4b7ee3ed81ea6e75c4ee134cce259605ac1afa38229ca6f34e8d5329f33dd6

  • SHA512

    8ca2f8229637c875f5520cfa526508ab055f2d46588e722cf68895e7a208fc90571e38ee29095a9f07b39965f3c9436264f582b22e8ae11bc5bc07bbbada8225

  • SSDEEP

    1536:YcKvgnZY4E/YYUbth9Dru9YhDWakpqKmY7:9tnZY4EQYUbtsavz

Malware Config

Extracted

Family

asyncrat

Botnet

Default

Attributes
  • delay

    1

  • install

    true

  • install_file

    tck.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/R8gFU5SX

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1237145706423123999/BQqwyjXaKt7KqCLA_iWguAde2fiNgpA36IvFL69WoxRB6yoYhMjlc7o80Exvew2DFX8M

Targets

    • Target

      LastActivityView.exe

    • Size

      69KB

    • MD5

      0f9957e07c58ab3e2870c0e8bf7d872a

    • SHA1

      1a1d98204c0ed2ac1a693ae4fac0127ffbd61425

    • SHA256

      5b4b7ee3ed81ea6e75c4ee134cce259605ac1afa38229ca6f34e8d5329f33dd6

    • SHA512

      8ca2f8229637c875f5520cfa526508ab055f2d46588e722cf68895e7a208fc90571e38ee29095a9f07b39965f3c9436264f582b22e8ae11bc5bc07bbbada8225

    • SSDEEP

      1536:YcKvgnZY4E/YYUbth9Dru9YhDWakpqKmY7:9tnZY4EQYUbtsavz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Umbral payload

    • Modifies Windows Defender Real-time Protection settings

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks