General
-
Target
Infected.exe
-
Size
63KB
-
Sample
241013-e7q2hszaqh
-
MD5
2638e93d166163469df80c1e42cc59b6
-
SHA1
0c79fb51c844377a39dde19f8709abe856cd7556
-
SHA256
03b8046bd2c7d454a8a38da06f6138389b7c8b3af47036b6c79fab88adae0cda
-
SHA512
fdedffccb03173003ae18cbc623edf83eef682932d6aa195d85e9fd413ab241ad3df10804870b14ac28d909d0ec9f25ba7b9b800778251776c9697136d1987b0
-
SSDEEP
768:0k/9PXn1w787gC8A+XvqazcBRL5JTk1+T4KSBGHmDbD/ph0oXfPItl0lTYwNSu4V:BR1gMdSJYUbdh9IP0lTmu4dpqKmY7
Malware Config
Extracted
asyncrat
Default
Pizd11337-26540.portmap.host:26540
-
delay
1
-
install
true
-
install_file
svhost.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
2638e93d166163469df80c1e42cc59b6
-
SHA1
0c79fb51c844377a39dde19f8709abe856cd7556
-
SHA256
03b8046bd2c7d454a8a38da06f6138389b7c8b3af47036b6c79fab88adae0cda
-
SHA512
fdedffccb03173003ae18cbc623edf83eef682932d6aa195d85e9fd413ab241ad3df10804870b14ac28d909d0ec9f25ba7b9b800778251776c9697136d1987b0
-
SSDEEP
768:0k/9PXn1w787gC8A+XvqazcBRL5JTk1+T4KSBGHmDbD/ph0oXfPItl0lTYwNSu4V:BR1gMdSJYUbdh9IP0lTmu4dpqKmY7
-
Async RAT payload
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1