Resubmissions

09-08-2024 07:54

240809-jrq4sssbja 10

09-08-2024 07:41

240809-jja3lsxhkr 10

General

  • Target

    NurusltanCrack.exe

  • Size

    32.4MB

  • Sample

    240809-jja3lsxhkr

  • MD5

    5c5aa0a513a8ae042060f8bf4df0f5ec

  • SHA1

    35b7d79ff18b63e9f1ddd0f0912ae6cbdc06e018

  • SHA256

    6598924e8f1aeff9b6b1326299e5fc98886b253d43530917fe1ca41a4c244a19

  • SHA512

    16b502d9e2a7336f387eea196d824b9a6a9cd50266313b3ab2667b3c1ace16f7fb5db22b141d897cd515cf0ba292e243d768e3fcc3eaa0d233b45053d544d371

  • SSDEEP

    786432:Sq/+w/Up2g3xh7mw4cctICOuKq8G+fKb3o1ixNpd:Sq/Hsp2oT7N4NtICOuR7gk

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

def

C2

37.18.62.18:8060

Mutex

era2312swe12-1213rsgdkms23

Attributes
  • delay

    1

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      NurusltanCrack.exe

    • Size

      32.4MB

    • MD5

      5c5aa0a513a8ae042060f8bf4df0f5ec

    • SHA1

      35b7d79ff18b63e9f1ddd0f0912ae6cbdc06e018

    • SHA256

      6598924e8f1aeff9b6b1326299e5fc98886b253d43530917fe1ca41a4c244a19

    • SHA512

      16b502d9e2a7336f387eea196d824b9a6a9cd50266313b3ab2667b3c1ace16f7fb5db22b141d897cd515cf0ba292e243d768e3fcc3eaa0d233b45053d544d371

    • SSDEEP

      786432:Sq/+w/Up2g3xh7mw4cctICOuKq8G+fKb3o1ixNpd:Sq/Hsp2oT7N4NtICOuR7gk

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks