Resubmissions

25-09-2024 13:28

240925-qq3jrs1dja 10

24-09-2024 20:51

240924-zm82taxhle 10

24-09-2024 19:21

240924-x2m2sazhql 10

24-09-2024 19:17

240924-xzhpaazgpj 10

24-09-2024 18:11

240924-wsp94sxcnp 10

24-09-2024 17:54

240924-whcahawgjr 10

General

  • Target

    Anarchy Panel 4.7.7z

  • Size

    52.3MB

  • Sample

    240924-x2m2sazhql

  • MD5

    40fa4dfb75a2ff3595435c374a5f5e68

  • SHA1

    2086fd6c2f38fb20e87a50cf3ee27dfb68fa3843

  • SHA256

    bf9aa6957a814d551d3ba7f96690ff76c79ff884718b3a0f16ab17b96c2637ff

  • SHA512

    a0655a97428c2a1981015c7b819a207d119b82fe88242f8a0e703adf3eedd386de73412e428dfce1fcedacbbb04ff23775c66e21584f27b5065ed32f510da3de

  • SSDEEP

    1572864:AN5bnkUpaR1Ju0aVJfQF593gMr8okmaHY5q2iSBHxhj3lF:Q5bkxbJOJfnMYoriIRhX

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain
aes.plain

Targets

    • Target

      Anarchy Panel 4.7.7z

    • Size

      52.3MB

    • MD5

      40fa4dfb75a2ff3595435c374a5f5e68

    • SHA1

      2086fd6c2f38fb20e87a50cf3ee27dfb68fa3843

    • SHA256

      bf9aa6957a814d551d3ba7f96690ff76c79ff884718b3a0f16ab17b96c2637ff

    • SHA512

      a0655a97428c2a1981015c7b819a207d119b82fe88242f8a0e703adf3eedd386de73412e428dfce1fcedacbbb04ff23775c66e21584f27b5065ed32f510da3de

    • SSDEEP

      1572864:AN5bnkUpaR1Ju0aVJfQF593gMr8okmaHY5q2iSBHxhj3lF:Q5bkxbJOJfnMYoriIRhX

    Score
    3/10
    • Target

      Anarchy Panel.exe

    • Size

      54.6MB

    • MD5

      94bac1a0cc0dbac256f0d3b4c90648c2

    • SHA1

      4abcb8a31881e88322f6a37cbb24a14a80c6eef2

    • SHA256

      50c2dba1d961e09cb8df397b71bd3b6a32d0ee6dbe886e7309305dc4ba968f94

    • SHA512

      30ecee38d5d641abaf73e09a23c614cb3b8b84aa1f8ff1818e92c1f2b51bf6841d3e51564aecb5efd01a3d98db88f0938e7dd4ee9c74ca5477785c33c969ffd9

    • SSDEEP

      786432:RvcKHU1yll1EcgYwm/7hPo9b9DMs2PTUpRYj:lPU4bZwm/NwEIYj

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • Async RAT payload

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Renames multiple (1272) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Target

      Anarchy Panel.exe.config

    • Size

      3KB

    • MD5

      3d441f780367944d267e359e4786facd

    • SHA1

      d3a4ba9ffc555bbc66207dfdaf3b2d569371f7b5

    • SHA256

      49648bbe8ec16d572b125fff1f0e7faa19e1e8c315fd2a1055d6206860a960c9

    • SHA512

      5f17ec093cdce3dbe2cb62fec264b3285aabe7352c1d65ec069ffbc8a17a9b684850fe38c1ffd8b0932199c820881d255c8d1e6000cbbe85587c98e88c9acb90

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks