General
-
Target
jason test.exe
-
Size
529KB
-
Sample
240816-qzb36sxekf
-
MD5
56acec58d46d6f079c16209f4347360a
-
SHA1
a7587f272a6afc0751ead66478d9a00742ce007e
-
SHA256
0ebe58286c1f137fa8502c2b9e6f0e60b451409a3caac4125ef0ea10c931024d
-
SHA512
724b8f625045c27fb6df5a29dda9ff889865349661c6d810b858b97f4ef33ff6a5bee30f5c61d73a304694589c937450dae7d98275fe1642001bb42b79050216
-
SSDEEP
6144:qbioob8+F2a9boZguBQNYPj2jBoO33tq6qbXaYBc1g5aN9KBBBBBBByygHG/bZ+V:Nd8xZguBiYPAq81g5aN+BVKD
Behavioral task
behavioral1
Sample
jason test.exe
Resource
win11-20240802-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7375395402:AAEj5wSTewdwdI2lrdXYvNdlkLxj5pTH9pg/sendMessage?chat_id=6725988743
Targets
-
-
Target
jason test.exe
-
Size
529KB
-
MD5
56acec58d46d6f079c16209f4347360a
-
SHA1
a7587f272a6afc0751ead66478d9a00742ce007e
-
SHA256
0ebe58286c1f137fa8502c2b9e6f0e60b451409a3caac4125ef0ea10c931024d
-
SHA512
724b8f625045c27fb6df5a29dda9ff889865349661c6d810b858b97f4ef33ff6a5bee30f5c61d73a304694589c937450dae7d98275fe1642001bb42b79050216
-
SSDEEP
6144:qbioob8+F2a9boZguBQNYPj2jBoO33tq6qbXaYBc1g5aN9KBBBBBBByygHG/bZ+V:Nd8xZguBiYPAq81g5aN+BVKD
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1