General
-
Target
Shellbag analyzer.exe
-
Size
247KB
-
Sample
240808-mhkr7ssdpp
-
MD5
d3b88d7974e5ef23ed78f97d18fd0f8a
-
SHA1
cba12e2cfc60e994fbb7e99317c3130af9a532ea
-
SHA256
a39234abb087b986209b4ed86dbecafb50347409f37f6d20f2ca82230c356f79
-
SHA512
6e295e1f17e65d7685542304c8846ba076e4a52985a8cdc342cfa2969453050f6b7e98dbfe4f41247fe5dcce1f191daad42556913e04be0cc5a66c83909ab2b9
-
SSDEEP
6144:/bwmPMVWrVb3rBPwF9kfK8rpClz0KBb6o589GHWHWujiSPbp:/bw8ZrB5gBuj/PV
Behavioral task
behavioral1
Sample
Shellbag analyzer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Shellbag analyzer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
sdhjriajyp
-
delay
1
-
install
true
-
install_file
update.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/f2T8NYnM
Targets
-
-
Target
Shellbag analyzer.exe
-
Size
247KB
-
MD5
d3b88d7974e5ef23ed78f97d18fd0f8a
-
SHA1
cba12e2cfc60e994fbb7e99317c3130af9a532ea
-
SHA256
a39234abb087b986209b4ed86dbecafb50347409f37f6d20f2ca82230c356f79
-
SHA512
6e295e1f17e65d7685542304c8846ba076e4a52985a8cdc342cfa2969453050f6b7e98dbfe4f41247fe5dcce1f191daad42556913e04be0cc5a66c83909ab2b9
-
SSDEEP
6144:/bwmPMVWrVb3rBPwF9kfK8rpClz0KBb6o589GHWHWujiSPbp:/bw8ZrB5gBuj/PV
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1