General

  • Target

    Cranium.exe

  • Size

    48KB

  • Sample

    240530-xl2j8sgb9w

  • MD5

    0acff5a467301fe851017b11e1263334

  • SHA1

    67282d4682edbb78cc3eded3d3621d20060e5517

  • SHA256

    9864678182d8d06ed1bebd8aad901cab4f77cfced7547f5e365e8c1854ef2cdf

  • SHA512

    ec18c72cf4184781fe3deffa64c6dbd48f75ba9d185f6fa689469e1aded7aa7e5705c0f7abb5173f9ace1db039fbd0dda6f4d07014cac179f59132925df6f70f

  • SSDEEP

    768:6uYp9T3kH1jWUvTqRmo2qb2v8eIfEePIL1/Yr90bzZR51guD6NpHqS/9OuBDZ0C:6uYp9T34y2PZuEnp/9bzZR7guD8R/91L

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

HVo4diHzRR9N

Attributes
  • delay

    3

  • install

    true

  • install_file

    Cranium.exe

  • install_folder

    %Temp%

  • pastebin_config

    https://pastebin.com/raw/d3N8c1P9

aes.plain

Targets

    • Target

      Cranium.exe

    • Size

      48KB

    • MD5

      0acff5a467301fe851017b11e1263334

    • SHA1

      67282d4682edbb78cc3eded3d3621d20060e5517

    • SHA256

      9864678182d8d06ed1bebd8aad901cab4f77cfced7547f5e365e8c1854ef2cdf

    • SHA512

      ec18c72cf4184781fe3deffa64c6dbd48f75ba9d185f6fa689469e1aded7aa7e5705c0f7abb5173f9ace1db039fbd0dda6f4d07014cac179f59132925df6f70f

    • SSDEEP

      768:6uYp9T3kH1jWUvTqRmo2qb2v8eIfEePIL1/Yr90bzZR51guD6NpHqS/9OuBDZ0C:6uYp9T34y2PZuEnp/9bzZR7guD8R/91L

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks