General

  • Target

    MCG_Server_Launcher.zip

  • Size

    1.9MB

  • Sample

    240602-exdy7saf8t

  • MD5

    2cc72af79499b2c232919d6abb17ea94

  • SHA1

    6655cf7486620fa36c5dc37a27a214f544712260

  • SHA256

    1cc3f1cc3b268f29acadd420ca19b80491851c9c69f833960d3674b324dea122

  • SHA512

    07072f5ac9346d662241089e79bbbe53769ccc8c9a2703370ba7148fb322d90e9a6b8c485eaae05c0df371822cd110c70521439b6a32c1033b0b269803424359

  • SSDEEP

    49152:3kepqJ/VtYHz93+LXKd6wRYKWVP4kncrOszr5peK:3kep8vYToLXKx0pfcrZPeK

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://github.com/kevinsocute2/exetemp/releases/download/powershell/System.exe

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.5

Botnet

Default

Mutex

wdgbejlkhzx

Attributes
  • c2_url_file

    https://raw.githubusercontent.com/kevinsocute2/exetemp/main/ip.txt

  • delay

    1

  • install

    true

  • install_file

    Registry.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      MCG Server Launcher/MCG Server Launcher.exe

    • Size

      2.1MB

    • MD5

      3584a02b77f639b7d7fabe08797bb6eb

    • SHA1

      906e6a9044eae39ab17e60e28c4de5a9807c65b3

    • SHA256

      1c5c9ce6f9339eb57d39c35b166b5f64e8ea7f427d988aaa3a7d95ce81225e72

    • SHA512

      72942199d4ee6146055919de00a224ae90a08e0c5c58f9155a9beca7f986169bbcb8e09e59cae16e83e29e59521cbad77ccf958550abd92a4fbeb0db6e9a43a0

    • SSDEEP

      49152:j8mi6FoJtr7uht5r+LXKX6wZYKWHPo6lW9ssdrdjeN:j8mi6F4RujsLXmxMvnA91xeN

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks