General

  • Target

    Loader.bat

  • Size

    1KB

  • Sample

    241125-pcdg2swkcx

  • MD5

    de5a66871a7e14fe1c7d56db9aa2e8e5

  • SHA1

    c119aea04d27dd918b9aa3b734271707098cd022

  • SHA256

    5fbc4bddd26765b3c6f1b0ab2af444bf72f6e589ac6d289db2e4b7c8b195874e

  • SHA512

    24a452d84c478d733c6d0e23d62dfca3e629720542cae36164522bfe631a05d53bafcb91c3f70ccea669c662a5fcb0b728cc56305486c9358e6c60123044e5a5

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1310577588602667038/v6do4PoA82VdH0edzJ4iW13aksBJ6rEVHVHVO7Qj6EGYvvmguDUqbAezb57n5M3uYTWB

Extracted

Family

asyncrat

Botnet

Default

C2

technical-southwest.gl.at.ply.gg:58694

Attributes
  • delay

    1

  • install

    true

  • install_file

    WINDOWS.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Loader.bat

    • Size

      1KB

    • MD5

      de5a66871a7e14fe1c7d56db9aa2e8e5

    • SHA1

      c119aea04d27dd918b9aa3b734271707098cd022

    • SHA256

      5fbc4bddd26765b3c6f1b0ab2af444bf72f6e589ac6d289db2e4b7c8b195874e

    • SHA512

      24a452d84c478d733c6d0e23d62dfca3e629720542cae36164522bfe631a05d53bafcb91c3f70ccea669c662a5fcb0b728cc56305486c9358e6c60123044e5a5

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks