General
-
Target
Infected.exe
-
Size
63KB
-
Sample
240805-krfhqsvhnc
-
MD5
6ebf955e667eca74175c3542178de4d6
-
SHA1
ede474b8c1b9101424415e3b58087f1460024c31
-
SHA256
3a280f118c4f7ac82065573f90304f21133cdb63ca937538fb204044b5a5af97
-
SHA512
7c42c092074dcf9b664c1b0bf08d67e19880bb61bbc99411bebdabc5ff30494f6e7a9921c09434c7ad5abf1846d3779ad126c69e49841f6600f68d97b9f460fb
-
SSDEEP
768:Cil3pYNlrm78RIC8A+XjqazcBRL5JTk1+T4KSBGHmDbD/ph0oXlE24NEMSuLbpqM:jyr0AdSJYUbdh9+vYuLbpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win11-20240802-en
Malware Config
Extracted
asyncrat
testing
147.185.221.21:35374
-
delay
1
-
install
true
-
install_file
sigma.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
6ebf955e667eca74175c3542178de4d6
-
SHA1
ede474b8c1b9101424415e3b58087f1460024c31
-
SHA256
3a280f118c4f7ac82065573f90304f21133cdb63ca937538fb204044b5a5af97
-
SHA512
7c42c092074dcf9b664c1b0bf08d67e19880bb61bbc99411bebdabc5ff30494f6e7a9921c09434c7ad5abf1846d3779ad126c69e49841f6600f68d97b9f460fb
-
SSDEEP
768:Cil3pYNlrm78RIC8A+XjqazcBRL5JTk1+T4KSBGHmDbD/ph0oXlE24NEMSuLbpqM:jyr0AdSJYUbdh9+vYuLbpqKmY7
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1