General

  • Target

    1cfd4361277b82972da1c2bacadc270a.bin

  • Size

    25KB

  • Sample

    241021-bgyrwssell

  • MD5

    579af3519d2eda726d1e54b9c4cea821

  • SHA1

    32747d7976614b4329f6389427944e351ce7304a

  • SHA256

    5fb28decebbb259fc522821d4c65a134a98158f7e5b06f1ef3466388e2e657fc

  • SHA512

    a7bdcc1cac27456835e9d9bfd8754f3068206f4755f468672571499eca9e781dfaf937d09ec6e7127d7fffaea9424adc73a9a38df1104abb9c9c40c5dce18e94

  • SSDEEP

    768:0N3z56u4WM2Zi2PBHKPzbVP7JNYI4rJix7JQE4+E:0N3zUWM2MGorbVzJNYI4Vi5JQZ+E

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Albion

C2

198.154.99.162:6606

198.154.99.162:6607

198.154.99.162:6608

198.154.99.162:6609

198.154.99.162:6610

198.154.99.162:6611

198.154.99.162:6612

198.154.99.162:6613

198.154.99.162:6614

198.154.99.162:6615

198.154.99.162:6616

198.154.99.162:6617

198.154.99.162:6618

198.154.99.162:6619

198.154.99.162:6620

198.154.99.162:6621

198.154.99.162:6622

198.154.99.162:6623

198.154.99.162:6624

198.154.99.162:6625

Mutex

7XUA7jABSTCf

Attributes
  • delay

    3

  • install

    true

  • install_file

    RealtekAudio.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      b27e4c8287ff688b8da4045756c22d08ccc0d100970cda2cf4bff09880df496c.exe

    • Size

      48KB

    • MD5

      1cfd4361277b82972da1c2bacadc270a

    • SHA1

      1fcb2293499713ff9948134ceb30be4f12d101fc

    • SHA256

      b27e4c8287ff688b8da4045756c22d08ccc0d100970cda2cf4bff09880df496c

    • SHA512

      6d66fdf94993c8e48d37055a8617b2fa6c93b077e1c1ee8dfe8ae1d6cd131186af5378d28d3369463202e65984cdd0a63960838fa45a72bf8ea04071b3f1c0a0

    • SSDEEP

      1536:Auq9JTPNY72AUZ1oRjJBabg7UdROYgduxMZh6dAv:AuqnTPNo2A41oRjJBabg7UdQYS9T6Gv

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks