General
-
Target
idontwannabetrue.exe
-
Size
45KB
-
Sample
241116-way5as1bmq
-
MD5
65702e476fe79a572631dc686ce6e4df
-
SHA1
2afd23c0ed708604eb5382cdc6402b4e90a68466
-
SHA256
7346914f0703f198aeaf4d8417ba2f729cde3e8b034e2803f94b07800d7a4e7e
-
SHA512
0c6132ddf953b44ab98c0f118533315bc10c1eafcd6521b8e1376f856de9620b32e5b0905f783423f9b89aabd2284ad4aa36b51ff09c5850a4880ecdeb232269
-
SSDEEP
768:Ju50dTtQpVBTWU/fShmo2qggfayJFxiOPIBzjbMgX3iUUacah3UjNMLBDZbx:Ju50dTt0y2KRG3B3bDXSUUTNMddbx
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:62565
127.0.0.1:4782
127.0.0.1:1501
Cristopher11sa-62565.portmap.host:6606
Cristopher11sa-62565.portmap.host:7707
Cristopher11sa-62565.portmap.host:8808
Cristopher11sa-62565.portmap.host:62565
Cristopher11sa-62565.portmap.host:4782
Cristopher11sa-62565.portmap.host:1501
190.104.116.8:6606
190.104.116.8:7707
190.104.116.8:8808
190.104.116.8:62565
190.104.116.8:4782
190.104.116.8:1501
azxq0ap.localto.net:6606
azxq0ap.localto.net:7707
azxq0ap.localto.net:8808
azxq0ap.localto.net:62565
azxq0ap.localto.net:4782
azxq0ap.localto.net:1501
E2qgtjRHaRSi
-
delay
3
-
install
false
-
install_file
Java updater.exe
-
install_folder
%AppData%
Targets
-
-
Target
idontwannabetrue.exe
-
Size
45KB
-
MD5
65702e476fe79a572631dc686ce6e4df
-
SHA1
2afd23c0ed708604eb5382cdc6402b4e90a68466
-
SHA256
7346914f0703f198aeaf4d8417ba2f729cde3e8b034e2803f94b07800d7a4e7e
-
SHA512
0c6132ddf953b44ab98c0f118533315bc10c1eafcd6521b8e1376f856de9620b32e5b0905f783423f9b89aabd2284ad4aa36b51ff09c5850a4880ecdeb232269
-
SSDEEP
768:Ju50dTtQpVBTWU/fShmo2qggfayJFxiOPIBzjbMgX3iUUacah3UjNMLBDZbx:Ju50dTt0y2KRG3B3bDXSUUTNMddbx
-
Asyncrat family
-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1