Resubmissions

02-08-2024 15:17

240802-sn8zwayhnm 10

General

  • Target

    testoutput.exe

  • Size

    330KB

  • Sample

    240802-sn8zwayhnm

  • MD5

    04896d586dfa7f3fabaa68ce99f54c03

  • SHA1

    c2b1f452639879f593ff79837d6eb659f98ec329

  • SHA256

    ebbb1bcaa8c10a142bc149726fac6e4d235075dfd4acb33c83d419eba5b8f030

  • SHA512

    53eb676b95a94911546ff3a54195cd84fb0e618d161d7a5c0394df55e876cc8a04c39c403b9eb49ebfe89d666c670f750fd49918cfa621ea2458943487801de4

  • SSDEEP

    3072:EKG/7z3B2pKDYGq7KIBBwRjH6Ee8jS9ujgrhfJkApfEX/UvpvwmBB3YXYSHXce:EVHB2FWIkeEBj9jClJk0fsUtJSHXc

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

and-statements.gl.at.ply.gg:43442

Attributes
  • delay

    1

  • install

    true

  • install_file

    test124.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

form-fly.gl.at.ply.gg:41810

Attributes
  • Install_directory

    %Public%

  • install_file

    discord.exe

Targets

    • Target

      testoutput.exe

    • Size

      330KB

    • MD5

      04896d586dfa7f3fabaa68ce99f54c03

    • SHA1

      c2b1f452639879f593ff79837d6eb659f98ec329

    • SHA256

      ebbb1bcaa8c10a142bc149726fac6e4d235075dfd4acb33c83d419eba5b8f030

    • SHA512

      53eb676b95a94911546ff3a54195cd84fb0e618d161d7a5c0394df55e876cc8a04c39c403b9eb49ebfe89d666c670f750fd49918cfa621ea2458943487801de4

    • SSDEEP

      3072:EKG/7z3B2pKDYGq7KIBBwRjH6Ee8jS9ujgrhfJkApfEX/UvpvwmBB3YXYSHXce:EVHB2FWIkeEBj9jClJk0fsUtJSHXc

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks