General
-
Target
LMAOBOX2024UPDATED.exe
-
Size
120.1MB
-
Sample
241013-klwyjasbpk
-
MD5
264a408d44003e37218ddc3a89b5bab9
-
SHA1
5b5c26831e56fce1c5e9c4a786f4d513d71cec72
-
SHA256
b2bec8f81ead763ca0c4832018b182e897d3ad1c8192ce8757dcf7bc11bba34b
-
SHA512
1f8b0189d3f3264d3b22aa65863aa8631851a372ee431d3bf6e0e466460a5e824598315ba2e3f6935639a92573019d64ba3e1f4d23acbf391bae9ea558780fc9
-
SSDEEP
98304:CI7LjGgfbY1A+kd+wx1x1jF/IUSqKjJ5//4riHjHUUeX8QCxsoZz4MR002hO:CA2kd+wHx1jdPSToriHjdQ8QhouO0
Static task
static1
Behavioral task
behavioral1
Sample
LMAOBOX2024UPDATED.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
fishing
198.98.58.93:999
fishing
-
delay
1
-
install
true
-
install_file
Core Sound Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
LMAOBOX2024UPDATED.exe
-
Size
120.1MB
-
MD5
264a408d44003e37218ddc3a89b5bab9
-
SHA1
5b5c26831e56fce1c5e9c4a786f4d513d71cec72
-
SHA256
b2bec8f81ead763ca0c4832018b182e897d3ad1c8192ce8757dcf7bc11bba34b
-
SHA512
1f8b0189d3f3264d3b22aa65863aa8631851a372ee431d3bf6e0e466460a5e824598315ba2e3f6935639a92573019d64ba3e1f4d23acbf391bae9ea558780fc9
-
SSDEEP
98304:CI7LjGgfbY1A+kd+wx1x1jF/IUSqKjJ5//4riHjHUUeX8QCxsoZz4MR002hO:CA2kd+wHx1jdPSToriHjdQ8QhouO0
-
Async RAT payload
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3