General

  • Target

    IncogSkibidiExec12.exe

  • Size

    74KB

  • Sample

    240603-ass54sdh35

  • MD5

    dae09c648dc2d1cff32792c3a0352b50

  • SHA1

    e1c5443b4cd261fb25df40f925ee4007b41ace1c

  • SHA256

    69affc506aec76f31a632a366466e8cb4ba614ac4fa420be9d1f2b24cb65d30f

  • SHA512

    69185600bc9c5398abdcf21f77faf5c2e66a3d9a4ccf4fc1243c332574b2f3999adef9ba53cb192c5ca996e1227fd2168fa2f91d0c0d09fb178bb1243cf8959b

  • SSDEEP

    1536:QU6Acx0yAzPCv2PMVq0CU7LSIAH1bz/pHPHw/RQzc6LVclN:QUjcxHADc2PMV/4H1bzhHPQ/RQrBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Fake Incognito

C2

192.168.0.28:64627

82.5.77.16:64627

Mutex

gbaiwtmzxk

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows Security.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      IncogSkibidiExec12.exe

    • Size

      74KB

    • MD5

      dae09c648dc2d1cff32792c3a0352b50

    • SHA1

      e1c5443b4cd261fb25df40f925ee4007b41ace1c

    • SHA256

      69affc506aec76f31a632a366466e8cb4ba614ac4fa420be9d1f2b24cb65d30f

    • SHA512

      69185600bc9c5398abdcf21f77faf5c2e66a3d9a4ccf4fc1243c332574b2f3999adef9ba53cb192c5ca996e1227fd2168fa2f91d0c0d09fb178bb1243cf8959b

    • SSDEEP

      1536:QU6Acx0yAzPCv2PMVq0CU7LSIAH1bz/pHPHw/RQzc6LVclN:QUjcxHADc2PMV/4H1bzhHPQ/RQrBY

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks