General

  • Target

    Desty.zip

  • Size

    122.3MB

  • Sample

    240710-s4p7pswbpk

  • MD5

    ccbfce17a781e489422d277bbfc23e30

  • SHA1

    4cf1c10ab355b8c9d3a17941a1d74ab9bfb3f0f5

  • SHA256

    7f84b9d1710249e6194cf77d1bd58cdb0eef49ff1e502bbea5a586f5c2b9aa70

  • SHA512

    cd36777959abe9ad99c77662288b35c8adb92a6c47eb6d77b0ddbafc15c569f948f2ca782f81862a254bd07d42518da519beef8d1b449334aed8c41c2a2baa85

  • SSDEEP

    3145728:WmJFvew2b6jytK4ymGKaIRCR4oTF7d8Ewf7gYjmjv:WoFve/6X4yGaRTTMEU7gkCv

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:9090

127.0.0.1:27853

147.185.221.20:9090

147.185.221.20:27853

Mutex

wtiwmavnqbnhro

Attributes
  • delay

    1

  • install

    true

  • install_file

    msedge.exe

  • install_folder

    %AppData%

aes.plain
aes.plain
aes.plain

Targets

    • Target

      Desty.zip

    • Size

      122.3MB

    • MD5

      ccbfce17a781e489422d277bbfc23e30

    • SHA1

      4cf1c10ab355b8c9d3a17941a1d74ab9bfb3f0f5

    • SHA256

      7f84b9d1710249e6194cf77d1bd58cdb0eef49ff1e502bbea5a586f5c2b9aa70

    • SHA512

      cd36777959abe9ad99c77662288b35c8adb92a6c47eb6d77b0ddbafc15c569f948f2ca782f81862a254bd07d42518da519beef8d1b449334aed8c41c2a2baa85

    • SSDEEP

      3145728:WmJFvew2b6jytK4ymGKaIRCR4oTF7d8Ewf7gYjmjv:WoFve/6X4yGaRTTMEU7gkCv

    Score
    1/10
    • Target

      CefSharp.BrowserSubprocess.Core.dll

    • Size

      915KB

    • MD5

      100c32f77e68a2ce962e1a28997567ea

    • SHA1

      a80a1f4019b8d44df6b5833fb0c51b929fa79843

    • SHA256

      c0b9e29b240d8328f2f9a29ca0298ca4d967a926f3174a3442c3730c00d5a926

    • SHA512

      f95530ef439fa5c4e3bc02db249b6a76e9d56849816ead83c9cd9bcd49d3443ccb88651d829165c98a67af40b3ef02b922971114f29c5c735e662ca35c0fb6ed

    • SSDEEP

      24576:PkwmtUw8kMmxuUjB7v/jFAGGUY9Wis0veKCZ2ZiVBhEDssQjPc8DnXoSiW+YfDxN:PrOer9Wis0veKCZ2ZiVBhEDssQjPc8DT

    Score
    3/10
    • Target

      CefSharp.BrowserSubprocess.exe

    • Size

      7KB

    • MD5

      516ff62b2e1f4642caa954c0968719e8

    • SHA1

      e349d0ce82e2109dd0d18416d9cf46e8411b7f15

    • SHA256

      19da58849cec5933860116e60a1e94b08e30d90e0f955768270b47998d612045

    • SHA512

      7aa4a0c87b29c2a84f585a884d8208fc2352a43f2cdb549c100e3b121837ad5f8dadb1101f57d1d3fcb7ebec9d9f22e07dc14239b7d2e2d25793c999becf288b

    • SSDEEP

      96:VpZxBI7kRTmQBDvTR/GNHAeFZZetmArNt61OYcXe5U:XBIYTmQBHRsHAeFZKsAYcXeS

    Score
    1/10
    • Target

      CefSharp.Core.Runtime.dll

    • Size

      1.3MB

    • MD5

      09cba584aa0aae9fc600745567393ef6

    • SHA1

      bbd1f93cb0db9cf9e01071b3bed1b4afd6e31279

    • SHA256

      0babd84d4e7dc2713e7265d5ac25a3c28d412e705870cded6f5c7c550a5bf8d5

    • SHA512

      5f914fa33a63a6d4b46f39c7279687f313728fd5f8437ec592369a2da3256ccff6f325f78ace0e6d3a2c37da1f681058556f7603da13c45b03f2808f779d2aa1

    • SSDEEP

      24576:5Ac2t6Twn/0ke6ruDPMY0BQJzTzAC991g44ekgpqc4CQKZi5P9xh0gsWLgiHesms:q6TmQJrXg44ekgpqc4CQKZi5P9xh0gsI

    Score
    3/10
    • Target

      CefSharp.Core.dll

    • Size

      898KB

    • MD5

      1bb24b22d9bd996c038d26b600ed18a8

    • SHA1

      c2629a8a26c9c0969501923f84874838087cca2b

    • SHA256

      944b987a0b677d354e24ee15bba65f73b0f051338f576234a975a49493399873

    • SHA512

      38578e0d1a39ccc9851ff80d3a0f5342a34303229e2898c3ca32dad11017d4277720f54b472c2f1a0b73f47d5ba6352aa7be8ae2ed72b3b25a01dd8292591421

    • SSDEEP

      6144:f6tY8dWKH9OxlAADuyszmqcRePgvoMtkjmIfLtfTPxrnQGf4YsFZtFCiHF9/zZgl:fW9OJopjjtrJTA/4iHfbaRWt

    Score
    1/10
    • Target

      CefSharp.Wpf.dll

    • Size

      114KB

    • MD5

      ceaf0bad83fac8ce71853cd820e4ed9d

    • SHA1

      4eed686fbba7d4603b596fb8e494b8f452a05886

    • SHA256

      eaced1f76adb8ee756033baee29a47b1f4d4b657ebd105a7e25c8dc4fbc48cba

    • SHA512

      4ed3f83e797eade8f0d1c6b80ce49d18f00daaf5d69421a4920e3cea2e7d78c3622193ca65b6ab1dab14c57e7f893a7b1edb27b83f343ea4df731d80aa21ff82

    • SSDEEP

      3072:GtXa7DS3PzVafuE92oNf1VmVg1s0cOm5RpE:GtK7DS3PzVafuEUNVg1fI

    Score
    1/10
    • Target

      CefSharp.dll

    • Size

      272KB

    • MD5

      9ca06a8f9e5f7239ca225ab810274023

    • SHA1

      e1a219f567a7b7d3af9386df51b14c76e769c044

    • SHA256

      5fd00ae3e83e6ca156647ff6df87b49ffc7cad47c23fe3ae07c067c5adf6f74a

    • SHA512

      430c9bceed5439b987d5bd4840cfe32411ca61594f18597aca1948aa39a22c9d70beadf3bb9b1dd0373f81a94a25dcba17fa8e8c73abf06cba28d0971d5614c5

    • SSDEEP

      3072:T79yn4ZKvXBctaKCCVEB3+yggNk5KolWEuJoyS5Vg00OKMlUtrz+pyUU2jCGqkp:5KfBuzVM37xEuJoJg00jMlY+pmD+

    Score
    1/10
    • Target

      Client.exe

    • Size

      74KB

    • MD5

      27c49af92e90025eccaa183d566174fe

    • SHA1

      925b63f38235e3cce4ed7c9a3769684aa80e68e1

    • SHA256

      600cb4630d60e6e35297eff8d01114ad0bdfbb040ef917ae6a66c9d55c9075b2

    • SHA512

      1dd948115f38200f00f4e636fa811637f6c503624540552a1e8c622098f346965584baf2d11f25e14d85d20676286b82177f9f621e2a3aeefbdc282870ad585d

    • SSDEEP

      1536:2UINwcxKHXwzCtmPMV2e9VdQuDI6H1bf/dwKoElRQzcqLVclN:2UIicxK8WmPMV2e9VdQsH1bfWLElRQbi

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Target

      DestyApi.json

    • Size

      984B

    • MD5

      f8d7ddab9fbc05cbdbc69e9848054ddf

    • SHA1

      5a2efe926c270549128b9f602b76e676b72f176e

    • SHA256

      13b75376b1c2b80063909411a5794fdb516b79c3f2749e6a4b451dd2505f65ab

    • SHA512

      6da7f1c9248386e61d4600c9bac1b64f608e62b0b6d0bf7f5466fd826288802e48725eb72918e977d4c7979f642099657af9230c64dbb51954bb71b010ec0d84

    Score
    3/10
    • Target

      DestyInstaller.exe

    • Size

      16.3MB

    • MD5

      6d2954b10d36e8e2b628c016d3c87591

    • SHA1

      8b1d2f2a7d1dc060fd9c5f7e18762fae068186e8

    • SHA256

      cc7a11de913da74633615b099731de0b991fe92473fc343d7eeebdc969d1c788

    • SHA512

      efbe1f6b4cc4c54039b3a1ed5e4f4f48575277019b650684208ffde94ab1b3e28df9e26e827c5e1e834091084e2cffdc678136e963e53541c62e59b200adfb30

    • SSDEEP

      393216:hEkcqY1L01+l+uq+Vvs1+TtIiFvY9Z8D8Ccl6ln9EW0jyLHS:hkDZ01+l+uqgvs1QtI6a8DZcIl9wy2

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Creal.pyc

    • Size

      48KB

    • MD5

      fd88ff3b1aab026b3427073e78077299

    • SHA1

      731d539f591cee0c1c5f33a0076091f7cb27c3f1

    • SHA256

      9170686e1e8c4e5f73fbce5acc899b84558ee56d45169fd65776dc4bc97982cb

    • SHA512

      5e5ed4cd512dde7e6e2f1127c88960fb1d9871be733d186c28750f3c8ba558bde0985555069e41299f20e8739be7f97fec2dac431163ca121b4508f952121f85

    • SSDEEP

      768:PpFnr1ya7K+aTMdcmrVWwzO/phReWdXEXuGtz07VOZZYGQmGw8jt4xMao3Q1:/r8aqMamgphoWdUeOPZZYGQmGwWaoA

    Score
    3/10
    • Target

      Readme.txt

    • Size

      622B

    • MD5

      adaeca265fa2a3f092ea42ba6025d01d

    • SHA1

      99a47f67cc6194458f036b21e0939efa9f93adc3

    • SHA256

      1adf40463cfe8c206a21041d5b7dcee8519474dc50edcb14d9bbacafeec044ae

    • SHA512

      c59ee7fae1018dfc2b0993cb96e9c62955f0bba8354f38c5e9456c974a01c3a03083e7ae87cdcee41dc16be379579af51f8193ef668a30c93688805907d6f1ff

    Score
    3/10
    • Target

      Updater.exe

    • Size

      74KB

    • MD5

      56c2943af429929b627d9c788e82dc3c

    • SHA1

      cfb23725cf43512ff8bcdde96c00548f2eda57c4

    • SHA256

      5d15194f5c0260f77520c3e3c3b0aa8dcac5d59a942f5ef61baa2e6cbe6ac922

    • SHA512

      b549db00764fd52e4dc1646c4bad6bc34da24bd0fd74514c1ee3f67dae2287fd69fbf8815c24bc1259282f29c92699d3e7753adfa09a68c444aa9e2d69acdb27

    • SSDEEP

      1536:2UINwcxKHXwzCtmPMV2e9VdQuDI6H1bf/eyQzcqLVclN:2UIicxK8WmPMV2e9VdQsH1bf5QbBY

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      chrome_100_percent.pak

    • Size

      667KB

    • MD5

      ae195e80859781a20414cf5faa52db06

    • SHA1

      b18ecb5ec141415e3a210880e2b3d37470636485

    • SHA256

      9957802c0792e621f76bbdb1c630fbad519922743b5d193294804164babda552

    • SHA512

      c6fef84615fe20d1760ca496c98629feb4e533556724e9631d4282622748e7601225cf19dfb8351f4b540ae3f83785c1bcea6fe8c246cf70388e527654097c1c

    • SSDEEP

      12288:FI3H1fJxjzgsz5B0GDJQrnKs8SNP+QSsSilxNz40D+cIXgxEqoO0TehErw5:C3VBx7zEEmPLSUNz40KcUgxEqoO0TOv5

    Score
    3/10
    • Target

      chrome_200_percent.pak

    • Size

      1.0MB

    • MD5

      1abf6bad0c39d59e541f04162e744224

    • SHA1

      db93c38253338a0b85e431bd4194d9e7bddb22c6

    • SHA256

      01cb663a75f18bb2d0d800640a114f153a34bd8a5f2aa0ed7daa9b32967dc29e

    • SHA512

      945d519221d626421094316f13b818766826b3bedddab0165c041540dddadc93136e32784c0562d26a420cb29479d04d2aa317b8d605cd242e5152bf05af197e

    • SSDEEP

      24576:83zB69p5zLmmibkFR8+mZZhQumegvQtSP0KAwvdobaV26edhOLoeu5:83E53mNbkFRJmPhQRhQsP0KVvdl2jrOi

    Score
    3/10
    • Target

      chrome_elf.dll

    • Size

      1020KB

    • MD5

      7191d97ce7886a1a93a013e90868db96

    • SHA1

      52dd736cb589dd1def87130893d6b9449a6a36e3

    • SHA256

      32f925f833aa59e3f05322549fc3c326ac6fc604358f4efbf94c59d5c08b8dc6

    • SHA512

      38ebb62c34d466935eabb157197c7c364d4345f22aa3b2641b636196ca1aeaa2152ac75d613ff90817cb94825189612ddd12fb96df29469511a46a7d9620e724

    • SSDEEP

      12288:5iQwqdp5JyuHjLLvSWaaLjqSPSN9bcWiZ5J+l6UequWRz2n:5i5YIub1a8qSPSNOld4d

    Score
    1/10
    • Target

      d3dcompiler_47.dll

    • Size

      3.9MB

    • MD5

      3b4647bcb9feb591c2c05d1a606ed988

    • SHA1

      b42c59f96fb069fd49009dfd94550a7764e6c97c

    • SHA256

      35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7

    • SHA512

      00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50

    • SSDEEP

      49152:OS7PQ+besnXqRtHKzhwSsz6Ku1FVVOsLQuouM0MeAD36FqxLfeIgSNwLTzHiU2Ir:O4PhqqFVUsLQl6FqVCLTzHxJIMd

    Score
    3/10
    • Target

      debug.log

    • Size

      67KB

    • MD5

      f24d3a42e7c05e718ab7cd768a55cc8c

    • SHA1

      3616da8f5eb2c327e6a4d17b1d35760eb612a479

    • SHA256

      ef967053dcf6fd35a2da16b9d47e9ae1f16c42466b2ec2767ad3181296f03392

    • SHA512

      2450c033c45652c5f3a8b2384b7a500b912ef34955ce9551501ccc2ca043ea1b4d71367ad87fbe6e65f03849622ec50dfe46121ace86b5335afdb357b2d87389

    • SSDEEP

      768:Rwg8zdVpxFDK6EY5uA8uIhjvP53yDj4Rk/YiiZeogye4MRxF:N0Qo

    Score
    3/10
    • Target

      icudtl.dat

    • Size

      10.2MB

    • MD5

      74bded81ce10a426df54da39cfa132ff

    • SHA1

      eb26bcc7d24be42bd8cfbded53bd62d605989bbf

    • SHA256

      7bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9

    • SHA512

      bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a

    • SSDEEP

      196608:WgPBhORiuQwCliXUxbblHa93Whli6Z26wO+:W8wkDliXUxbblHa93Whli6ZUF

    Score
    3/10
    • Target

      libEGL.dll

    • Size

      359KB

    • MD5

      7dd6b0e4a31d35a0fae5ff425707073c

    • SHA1

      fbd12e9f8e2252c52ce555c2ebbd7f07e62a0140

    • SHA256

      8762d8001fc3ddd90e3129dfea172817e8d09b9936eaae391957de4326c8c906

    • SHA512

      726968df6b83ab5f589276672250d92f532fe2dcea2176e42031a7f1dcecf578b0320cfe2a7d88bb9883ad99387d71c6ebf1e9968272bb5e62850ef09abd2648

    • SSDEEP

      6144:74otxiotonwSbWTbrTEHdyVwiCSH/gWqkEC/D789uOSna:soL3VCWTbrTEHdyZp6I

    Score
    1/10
    • Target

      libGLESv2.dll

    • Size

      6.6MB

    • MD5

      8803db5b167fb5a5f8a8c595c4e4d7c6

    • SHA1

      7fde861151f3bea66c65b6c2487a30728048811a

    • SHA256

      52a58d25a41f4bd31cdb4a0d306217862e04ebf7c1925cc85330054a5523d719

    • SHA512

      2fa9a0eda221982896e41eb387b5e156198615ac1a1fbac0acffd13008919368b41a240df416c1fce2e48c20a14cd7af7cca9fba476ada5e64a0cadde84a44b7

    • SSDEEP

      196608:JFvNls3ohV5o1VyUXAHi5oJI0bUlYLY8bVaex51Rf0ZaNWNdrR:LNl9ovXT5oJvb0gYuaez1Rf0Tdr

    Score
    1/10
    • Target

      libcef.dll

    • Size

      172.1MB

    • MD5

      967dec6091ac3d9711a4d42b44e7f94d

    • SHA1

      851f45fba8a521ef6e18db08449f100cdfe0e12c

    • SHA256

      d0c2d48f10d7333d3ef27a88c75925d2ba2ccdfa3776a2167d7b2d6b764d44f1

    • SHA512

      3c3da14c0cd22522efd6f068fe0c03de7e57cc3737050d1c396b162deedc037807769dd41959d3a8f79886c23f92759cfe035b220855ee6c4ea2c59c9b80b9dc

    • SSDEEP

      1572864:0ZtQpYZYIf6OlbFndcIQ6/zYhWaQJ2k75nfI7Pmx1knbsHap/mKAh6pVwThrBRcc:0Ziw/kvwO9WDq4Icv2tZFVvwbnyQ

    Score
    1/10
    • Target

      resources.pak

    • Size

      8.0MB

    • MD5

      4933d92c99afa246fc59eef010d5c858

    • SHA1

      98d443654e93c73dd317f9f847f71fba3d5b3135

    • SHA256

      62f4674daa15245ee081920b8ee191e72f36ca8fe24f6b986a832f45676915b2

    • SHA512

      a3a69523c8e7310716daeebc06c2ba4fce673eccd1958e824ff179b82f4502d0ec095190179bbb387342e4150f952ea7533182fb6ba90377d17dafba8f4da623

    • SSDEEP

      196608:JBeWph8pSBYzYJq9AuMwVPKDjCEkrH8quPgPX:neWp+pSBpyAupMXCEkrH8p0

    Score
    3/10
    • Target

      v8_context_snapshot.bin

    • Size

      643KB

    • MD5

      28477a60b4fbd51dfef5237245817690

    • SHA1

      b0afd5ea9f9d550124f23c65bc7851ddeffc662f

    • SHA256

      169ea86f544e5cdf2a460675f876a9abb7f56bbe122782e94bb03d624931fc12

    • SHA512

      3520658583bb498d5032a7f7ae77195fd2e5f8ed03c6531e56dee8320d8701102a723766e59f7766ab223f837e65a6d85cf862bb2bef6d2755ce45e672a47b22

    • SSDEEP

      6144:rJ8NbhO1/n8WRPyfR5mj4Wl2NNm6EKdxUJCnNlEux0fi9vjA5YbVKFLGxI6HYD:ruNbhnR5m+NUJ00f8lKOIzD

    Score
    3/10
    • Target

      vk_swiftshader.dll

    • Size

      4.4MB

    • MD5

      0ec149455727ace9acc09b3ba2c3a2b2

    • SHA1

      6eeb990876cef6a34115b67f3190255db589f723

    • SHA256

      e2d8ef53897e864b5b66bc73606681c99461798a9f4c1e13ca5cef7bc774d7fd

    • SHA512

      c8eaa598c9439b1f2375fdac1f58896853510bddbd640707b9142c0d3793836120b28d7c2bd0407f0d5656dd19f14b312f37b7ac0165c9cc8b4c1a0f2af62531

    • SSDEEP

      98304:ZJ2CfZE7/v0+gfnaacHIhXH6jMofF4DSaaHSyh2z7mGpG:u73lA36jvcSaaHSGGG

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks