General
-
Target
Loader.exe
-
Size
63KB
-
Sample
241121-266rxawqfn
-
MD5
7ceb11ebb7a55e33a82bc3b66f554e79
-
SHA1
8dfd574ad06ded662d92d81b72f14c1914ac45b5
-
SHA256
aea3e89e45a33441bcd06c990282f8601eb960a641c611222dce2fe09685e603
-
SHA512
d8cd7af50996015163c8926fc7b6df6a6e2c0b3f6c8fcff37cad5b72fed115f7134723d99f61a20576b83e67107a3a410f5ef2312191446b3d0759cb739e6ccd
-
SSDEEP
768:rig6BqomfHz4c78F3C8A+XuLvRIOdJD7P7DEhfW1+T4iSBGHmDbDOphLoXaHnCtB:i+4/WD7jhBYUbghiynCCundpqKmY7
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
technical-southwest.gl.at.ply.gg:58694
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Targets
-
-
Target
Loader.exe
-
Size
63KB
-
MD5
7ceb11ebb7a55e33a82bc3b66f554e79
-
SHA1
8dfd574ad06ded662d92d81b72f14c1914ac45b5
-
SHA256
aea3e89e45a33441bcd06c990282f8601eb960a641c611222dce2fe09685e603
-
SHA512
d8cd7af50996015163c8926fc7b6df6a6e2c0b3f6c8fcff37cad5b72fed115f7134723d99f61a20576b83e67107a3a410f5ef2312191446b3d0759cb739e6ccd
-
SSDEEP
768:rig6BqomfHz4c78F3C8A+XuLvRIOdJD7P7DEhfW1+T4iSBGHmDbDOphLoXaHnCtB:i+4/WD7jhBYUbghiynCCundpqKmY7
-
Asyncrat family
-
Stealerium family
-
Async RAT payload
-
Renames multiple (3162) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1