General
-
Target
woofer.exe
-
Size
63KB
-
Sample
241123-2eh7jazmcz
-
MD5
e15497d7443c2dee4cf4ae3bbbc344f9
-
SHA1
ed863f95cf9701ccde2db4119d65aa1bf1060b54
-
SHA256
aca0856176e5bdbe4e93fb853855fe20b8317942910b5ac97b200575f0862fa9
-
SHA512
1c6dedcbfc88ec03a8b6a7031e10381ec26eba0df7083a636555b28a752792c72774d5add0378e944f1d646d5abf7e328f57c19fe1ede5d87f04cad3b0f2ec5e
-
SSDEEP
768:Z951Fn3n9P78zQC8A+XvdvnOLJk7074EhfW1+T4OSBGHmDbDfphKoX55anSuMdph:RX9x6k7ScZYUbVhj5TuMdpqKmY7
Behavioral task
behavioral1
Sample
woofer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
woofer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
81.161.238.249:3232
-
delay
1
-
install
true
-
install_file
BootComponent.exe
-
install_folder
%Temp%
Targets
-
-
Target
woofer.exe
-
Size
63KB
-
MD5
e15497d7443c2dee4cf4ae3bbbc344f9
-
SHA1
ed863f95cf9701ccde2db4119d65aa1bf1060b54
-
SHA256
aca0856176e5bdbe4e93fb853855fe20b8317942910b5ac97b200575f0862fa9
-
SHA512
1c6dedcbfc88ec03a8b6a7031e10381ec26eba0df7083a636555b28a752792c72774d5add0378e944f1d646d5abf7e328f57c19fe1ede5d87f04cad3b0f2ec5e
-
SSDEEP
768:Z951Fn3n9P78zQC8A+XvdvnOLJk7074EhfW1+T4OSBGHmDbDfphKoX55anSuMdph:RX9x6k7ScZYUbVhj5TuMdpqKmY7
-
Asyncrat family
-
Stealerium family
-
Async RAT payload
-
Renames multiple (3191) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1