General
-
Target
MCG_Server_Launcher.zip
-
Size
1.9MB
-
Sample
240602-exdy7saf8t
-
MD5
2cc72af79499b2c232919d6abb17ea94
-
SHA1
6655cf7486620fa36c5dc37a27a214f544712260
-
SHA256
1cc3f1cc3b268f29acadd420ca19b80491851c9c69f833960d3674b324dea122
-
SHA512
07072f5ac9346d662241089e79bbbe53769ccc8c9a2703370ba7148fb322d90e9a6b8c485eaae05c0df371822cd110c70521439b6a32c1033b0b269803424359
-
SSDEEP
49152:3kepqJ/VtYHz93+LXKd6wRYKWVP4kncrOszr5peK:3kep8vYToLXKx0pfcrZPeK
Static task
static1
Behavioral task
behavioral1
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win11-20240508-en
Malware Config
Extracted
https://github.com/kevinsocute2/exetemp/releases/download/powershell/System.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.5
Default
wdgbejlkhzx
-
c2_url_file
https://raw.githubusercontent.com/kevinsocute2/exetemp/main/ip.txt
-
delay
1
-
install
true
-
install_file
Registry.exe
-
install_folder
%AppData%
Targets
-
-
Target
MCG Server Launcher/MCG Server Launcher.exe
-
Size
2.1MB
-
MD5
3584a02b77f639b7d7fabe08797bb6eb
-
SHA1
906e6a9044eae39ab17e60e28c4de5a9807c65b3
-
SHA256
1c5c9ce6f9339eb57d39c35b166b5f64e8ea7f427d988aaa3a7d95ce81225e72
-
SHA512
72942199d4ee6146055919de00a224ae90a08e0c5c58f9155a9beca7f986169bbcb8e09e59cae16e83e29e59521cbad77ccf958550abd92a4fbeb0db6e9a43a0
-
SSDEEP
49152:j8mi6FoJtr7uht5r+LXKX6wZYKWHPo6lW9ssdrdjeN:j8mi6F4RujsLXmxMvnA91xeN
-
StormKitty payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-