General

  • Target

    FlashBTC PegasusCorp.zip

  • Size

    234.1MB

  • Sample

    240826-sqdxhssbjl

  • MD5

    1cb76a7d6a500832d34f5419ad1d1693

  • SHA1

    3d9cf315c59cadf2578300d60b88799441d2303c

  • SHA256

    7899ae903ebad6a047163159d8a6afe8a9ce3f56e1e133469dd800a3f24e4077

  • SHA512

    0d7c2736caf56a966f7260df7c4882670289ac21154ae1d7f4eb77e04e089f6a01f423b2d61c560f6d0a72709f1b86a96fa567e070d11e0e339b6e1ec57c1248

  • SSDEEP

    6291456:qzwqAYRrU+Y8J9rwqKtYjtRzPJdWRxBEecXSBlVyM8VshG:qzwqAB+1rrwqzhRzxdWXB7ciBlVyM8uw

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      FlashBTC PegasusCorp.zip

    • Size

      234.1MB

    • MD5

      1cb76a7d6a500832d34f5419ad1d1693

    • SHA1

      3d9cf315c59cadf2578300d60b88799441d2303c

    • SHA256

      7899ae903ebad6a047163159d8a6afe8a9ce3f56e1e133469dd800a3f24e4077

    • SHA512

      0d7c2736caf56a966f7260df7c4882670289ac21154ae1d7f4eb77e04e089f6a01f423b2d61c560f6d0a72709f1b86a96fa567e070d11e0e339b6e1ec57c1248

    • SSDEEP

      6291456:qzwqAYRrU+Y8J9rwqKtYjtRzPJdWRxBEecXSBlVyM8VshG:qzwqAB+1rrwqzhRzxdWXB7ciBlVyM8uw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks