General

  • Target

    DAnegds_LetThereBeCarnage.exe

  • Size

    176KB

  • Sample

    241108-z73qjayrdx

  • MD5

    9be0ce1fee8d843a42b1dcb1ae8a3eaa

  • SHA1

    8ba99f4d945c297a78c11eaebf3e25a13155192e

  • SHA256

    88b40bff36c532652d1c4da16fafe23d4dd0460618c54a489a6418281dbb0646

  • SHA512

    b2d362eceaf9dedf3296cc2582c5442414925490a36c51dc277d8c14a9a9cc10578dd88f74dd1afcc79da2377b6bc75a20c21c08491dc22f16f03546643863c3

  • SSDEEP

    3072:GlTFUnEvu9PnL/MvAFtOwQ9bwVjfyqyq5Q8hSbJX2UlD1fz6:SEUAFtOwQ9b0jfyqyqi8hSbJXZ1m

Malware Config

Targets

    • Target

      DAnegds_LetThereBeCarnage.exe

    • Size

      176KB

    • MD5

      9be0ce1fee8d843a42b1dcb1ae8a3eaa

    • SHA1

      8ba99f4d945c297a78c11eaebf3e25a13155192e

    • SHA256

      88b40bff36c532652d1c4da16fafe23d4dd0460618c54a489a6418281dbb0646

    • SHA512

      b2d362eceaf9dedf3296cc2582c5442414925490a36c51dc277d8c14a9a9cc10578dd88f74dd1afcc79da2377b6bc75a20c21c08491dc22f16f03546643863c3

    • SSDEEP

      3072:GlTFUnEvu9PnL/MvAFtOwQ9bwVjfyqyq5Q8hSbJX2UlD1fz6:SEUAFtOwQ9b0jfyqyqi8hSbJXZ1m

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Nightingale family

    • Nightingale stealer

      Nightingale stealer is an information stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks