General
-
Target
client.zip
-
Size
6.0MB
-
Sample
241018-yfv1yawhnr
-
MD5
bc5f335eeaa0437570ecc20bd3bfcd65
-
SHA1
729198e4717e77b8ad0b08587b68df6d0e454b56
-
SHA256
bdc23aadf049a7a31bb439aa95e554752f98d3b727d98d288266229781c4e464
-
SHA512
aa1dc14de45804d689c767c0780c18e3343c5410ecf52c02ce7a0ad23287a287394ac05fe097bb4661c101c660ff6ace437fa7ac62670604894a15162c446cdf
-
SSDEEP
196608:yCQ8+u3k9Xv+G9KtgcZGxvfHgIqEBI0hDQYSIYVnpF98h:y85kNWDtg4kfxBPkxpF90
Static task
static1
Behavioral task
behavioral1
Sample
munchenclient.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
munchenclient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Gibsons
198.98.58.93:999
obamanet_floyd999
-
delay
1
-
install
true
-
install_file
Core Sound Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
munchenclient.exe
-
Size
6.3MB
-
MD5
b995bac46098f434d11d84ec79bcb6ac
-
SHA1
3bb75ae3a8ec4054ccbeea3e3b2daf854bad81e2
-
SHA256
0a7f831cb637214cae61b0e833bd5e5fabadd5dc5d4d68331fe76cce091e1542
-
SHA512
72a515bfb170f0c06a26b3907cf31802a1ebb3b148d0f3a60d4424ea899f5f1b38d9a4bfd5fe25960d65eda8623e9ac12f1069d2940b1ad7e234c8bf78da54ce
-
SSDEEP
196608:kpPx7IW+Ryxgp1qRAL1vJYrET+9b6P32gm/uMkOPx5WzN:k9x5gp1qSL1vJYrM8b+3NkOOPxy
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1