General

  • Target

    Reaper.exe

  • Size

    8.4MB

  • Sample

    240522-fy1p2ada86

  • MD5

    caa418507bb991b91bbfa3e52623c2f4

  • SHA1

    9e1083e019ca8813024e1e58eac193d7a83b4b48

  • SHA256

    a8e3cbf1921a2485a307ac0ff2536accc77bc17db386a00e8d67c5537613b321

  • SHA512

    84e57b9c0d88e67c2ebb3ef89df82b33b4d466b663fa1b43dd0c050b140fbc986135169c8840b4d91ed5921379579a85e743cda27184172a7a7eb87156c61684

  • SSDEEP

    196608:SRyi9wysiM2+eLNxHPZe/eAwfPjprt/VU3jZoAp/aOROsEh/cH:SRLSIr+eLDvM9YBNMrQsh

Malware Config

Extracted

Family

asyncrat

Version

L838 RAT v1.0.0

Botnet

Default

C2

127.0.0.1:54984

127.0.0.1:4449

l838.ddns.net:54984

l838.ddns.net:4449

Mutex

azjrpxchkiev

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows Driver Foundation.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

xworm

C2

l838.ddns.net:3232

Attributes
  • Install_directory

    %Public%

  • install_file

    Windows Service Wrapper.exe

Targets

    • Target

      Reaper.exe

    • Size

      8.4MB

    • MD5

      caa418507bb991b91bbfa3e52623c2f4

    • SHA1

      9e1083e019ca8813024e1e58eac193d7a83b4b48

    • SHA256

      a8e3cbf1921a2485a307ac0ff2536accc77bc17db386a00e8d67c5537613b321

    • SHA512

      84e57b9c0d88e67c2ebb3ef89df82b33b4d466b663fa1b43dd0c050b140fbc986135169c8840b4d91ed5921379579a85e743cda27184172a7a7eb87156c61684

    • SSDEEP

      196608:SRyi9wysiM2+eLNxHPZe/eAwfPjprt/VU3jZoAp/aOROsEh/cH:SRLSIr+eLDvM9YBNMrQsh

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks