General
-
Target
Infected.exe
-
Size
63KB
-
Sample
241118-ckwbls1jbl
-
MD5
2bc3f993bd6f8d453d1713abe771ff15
-
SHA1
46a5ae1a18b6e4ef04df6fbf6af8bbc3c5bed3d3
-
SHA256
1d2e01cb8271f99e28d34c0bae6921b3d4102eadf1564a0049cd7ee45ffd7111
-
SHA512
28c71c3d64d7264d8982e7d6d8180e1378ddaaffe0cfd591c8c075bee82305667c6e5a3b367dee737568ce63ec3aca5c4959ed198aeca0c531b7ef4664748d41
-
SSDEEP
768:Cm0vnfEXf78awC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oXKnKWwkSusdpqKYC:qEXiLdSJYUbdh9G/wjusdpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
Default
who-gabriel.gl.at.ply.gg:8000
who-gabriel.gl.at.ply.gg:45700
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
2bc3f993bd6f8d453d1713abe771ff15
-
SHA1
46a5ae1a18b6e4ef04df6fbf6af8bbc3c5bed3d3
-
SHA256
1d2e01cb8271f99e28d34c0bae6921b3d4102eadf1564a0049cd7ee45ffd7111
-
SHA512
28c71c3d64d7264d8982e7d6d8180e1378ddaaffe0cfd591c8c075bee82305667c6e5a3b367dee737568ce63ec3aca5c4959ed198aeca0c531b7ef4664748d41
-
SSDEEP
768:Cm0vnfEXf78awC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oXKnKWwkSusdpqKYC:qEXiLdSJYUbdh9G/wjusdpqKmY7
-
Asyncrat family
-
Stealerium family
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1