General
-
Target
rylo.exe
-
Size
63KB
-
Sample
241007-w93lrs1erj
-
MD5
aa7ac768a5e8b8f2a8735b5c67e2e6d2
-
SHA1
631350d0f71fe7bb6416ac6404431f9d0876e7c4
-
SHA256
ceb280af0cfd62587099b2401a9dbbdbc846ef32f378e5df36d43fb82f311823
-
SHA512
6e566829c379ebcbbc52c90d7bce91d7e4b377be561d74ffb483b225a088b3c9ab2944eca1f5f16a7b1f49651ec6e3073e65d0e1a02e24a26c3057f424464bf9
-
SSDEEP
768:/LvXPRKF4j7C78BIC8A+X+mazcBRL5JTk1+T4KSBGHmDbD/ph0oXgOeIlfSuodph:j/RKy7QxdSJYUbdh9gwIuodpqKmY7
Behavioral task
behavioral1
Sample
rylo.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
rylo.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
pasharylo.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/V5yhZyAU
Extracted
C:\Users\Admin\Desktop\README.txt
https://tox.chat/download.html
Targets
-
-
Target
rylo.exe
-
Size
63KB
-
MD5
aa7ac768a5e8b8f2a8735b5c67e2e6d2
-
SHA1
631350d0f71fe7bb6416ac6404431f9d0876e7c4
-
SHA256
ceb280af0cfd62587099b2401a9dbbdbc846ef32f378e5df36d43fb82f311823
-
SHA512
6e566829c379ebcbbc52c90d7bce91d7e4b377be561d74ffb483b225a088b3c9ab2944eca1f5f16a7b1f49651ec6e3073e65d0e1a02e24a26c3057f424464bf9
-
SSDEEP
768:/LvXPRKF4j7C78BIC8A+X+mazcBRL5JTk1+T4KSBGHmDbD/ph0oXgOeIlfSuodph:j/RKy7QxdSJYUbdh9gwIuodpqKmY7
-
StormKitty payload
-
Async RAT payload
-
Renames multiple (2968) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1