General

  • Target

    LMAOBOX2024UPDATED.exe

  • Size

    120.1MB

  • Sample

    241013-klwyjasbpk

  • MD5

    264a408d44003e37218ddc3a89b5bab9

  • SHA1

    5b5c26831e56fce1c5e9c4a786f4d513d71cec72

  • SHA256

    b2bec8f81ead763ca0c4832018b182e897d3ad1c8192ce8757dcf7bc11bba34b

  • SHA512

    1f8b0189d3f3264d3b22aa65863aa8631851a372ee431d3bf6e0e466460a5e824598315ba2e3f6935639a92573019d64ba3e1f4d23acbf391bae9ea558780fc9

  • SSDEEP

    98304:CI7LjGgfbY1A+kd+wx1x1jF/IUSqKjJ5//4riHjHUUeX8QCxsoZz4MR002hO:CA2kd+wHx1jdPSToriHjdQ8QhouO0

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

fishing

C2

198.98.58.93:999

Mutex

fishing

Attributes
  • delay

    1

  • install

    true

  • install_file

    Core Sound Service.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      LMAOBOX2024UPDATED.exe

    • Size

      120.1MB

    • MD5

      264a408d44003e37218ddc3a89b5bab9

    • SHA1

      5b5c26831e56fce1c5e9c4a786f4d513d71cec72

    • SHA256

      b2bec8f81ead763ca0c4832018b182e897d3ad1c8192ce8757dcf7bc11bba34b

    • SHA512

      1f8b0189d3f3264d3b22aa65863aa8631851a372ee431d3bf6e0e466460a5e824598315ba2e3f6935639a92573019d64ba3e1f4d23acbf391bae9ea558780fc9

    • SSDEEP

      98304:CI7LjGgfbY1A+kd+wx1x1jF/IUSqKjJ5//4riHjHUUeX8QCxsoZz4MR002hO:CA2kd+wHx1jdPSToriHjdQ8QhouO0

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks