General
-
Target
Shellbag analyzer.exe
-
Size
237KB
-
Sample
240809-nq5ysatfrc
-
MD5
08c6f0c11bb897315729fb8ae967dfbd
-
SHA1
98e123459209064dacec489ef24a5eec1392a78d
-
SHA256
dc1c36296633b9850a0d4298082721fa13d8da3216c4c3b6ed98fa724effdef7
-
SHA512
52f931501a4e2db2c2a28b22d271032540eb425a7ea1532731bda694e947360d9452ac186cfdd6b0ed21e21adf54ef7dac80504d257df17300337ae349e4c4b8
-
SSDEEP
6144:PJLbEwF9kfK8rpClz0KBb6o589GHWHWujiSPbQ:PJMgBuj/Ps
Behavioral task
behavioral1
Sample
Shellbag analyzer.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Shellbag analyzer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
update.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/m5mgzzdQ
Targets
-
-
Target
Shellbag analyzer.exe
-
Size
237KB
-
MD5
08c6f0c11bb897315729fb8ae967dfbd
-
SHA1
98e123459209064dacec489ef24a5eec1392a78d
-
SHA256
dc1c36296633b9850a0d4298082721fa13d8da3216c4c3b6ed98fa724effdef7
-
SHA512
52f931501a4e2db2c2a28b22d271032540eb425a7ea1532731bda694e947360d9452ac186cfdd6b0ed21e21adf54ef7dac80504d257df17300337ae349e4c4b8
-
SSDEEP
6144:PJLbEwF9kfK8rpClz0KBb6o589GHWHWujiSPbQ:PJMgBuj/Ps
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (3248) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1