General
-
Target
gmx.bat
-
Size
44KB
-
Sample
240821-m41qjsvcld
-
MD5
eef38915ff6b8176f4b7905cb9ff4d60
-
SHA1
689183449a5d999e95161cb0ef681201b9ed5a8b
-
SHA256
39625cd5f171675c9780cbacb56b03a158bf20f3dfd7ac086789579e3a9d11bc
-
SHA512
44ec7348dde9a1ad9acc1ea61ab86ff764ee694345371cac6d30276fa4080f335afd45c65d66833a2e2a508981eaddbf3e823bcf978351694f85043e9cd9889e
-
SSDEEP
768:X5Zv0YLoUmtuDiwSnNrD/2V2kLEfcy2rcYWqhQdlSR6pexjNr/4q0VvKS9oDt+mz:XoSRi97u0dM1
Static task
static1
Behavioral task
behavioral1
Sample
gmx.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
gmx.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
157.20.182.172:3232
45.66.231.150:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
gmx.bat
-
Size
44KB
-
MD5
eef38915ff6b8176f4b7905cb9ff4d60
-
SHA1
689183449a5d999e95161cb0ef681201b9ed5a8b
-
SHA256
39625cd5f171675c9780cbacb56b03a158bf20f3dfd7ac086789579e3a9d11bc
-
SHA512
44ec7348dde9a1ad9acc1ea61ab86ff764ee694345371cac6d30276fa4080f335afd45c65d66833a2e2a508981eaddbf3e823bcf978351694f85043e9cd9889e
-
SSDEEP
768:X5Zv0YLoUmtuDiwSnNrD/2V2kLEfcy2rcYWqhQdlSR6pexjNr/4q0VvKS9oDt+mz:XoSRi97u0dM1
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1