General
-
Target
LastActivityView.exe
-
Size
69KB
-
Sample
240507-pj17paab57
-
MD5
0f9957e07c58ab3e2870c0e8bf7d872a
-
SHA1
1a1d98204c0ed2ac1a693ae4fac0127ffbd61425
-
SHA256
5b4b7ee3ed81ea6e75c4ee134cce259605ac1afa38229ca6f34e8d5329f33dd6
-
SHA512
8ca2f8229637c875f5520cfa526508ab055f2d46588e722cf68895e7a208fc90571e38ee29095a9f07b39965f3c9436264f582b22e8ae11bc5bc07bbbada8225
-
SSDEEP
1536:YcKvgnZY4E/YYUbth9Dru9YhDWakpqKmY7:9tnZY4EQYUbtsavz
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
tck.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/R8gFU5SX
Extracted
umbral
https://discord.com/api/webhooks/1237145706423123999/BQqwyjXaKt7KqCLA_iWguAde2fiNgpA36IvFL69WoxRB6yoYhMjlc7o80Exvew2DFX8M
Targets
-
-
Target
LastActivityView.exe
-
Size
69KB
-
MD5
0f9957e07c58ab3e2870c0e8bf7d872a
-
SHA1
1a1d98204c0ed2ac1a693ae4fac0127ffbd61425
-
SHA256
5b4b7ee3ed81ea6e75c4ee134cce259605ac1afa38229ca6f34e8d5329f33dd6
-
SHA512
8ca2f8229637c875f5520cfa526508ab055f2d46588e722cf68895e7a208fc90571e38ee29095a9f07b39965f3c9436264f582b22e8ae11bc5bc07bbbada8225
-
SSDEEP
1536:YcKvgnZY4E/YYUbth9Dru9YhDWakpqKmY7:9tnZY4EQYUbtsavz
-
Detect Umbral payload
-
Async RAT payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1