General
-
Target
reverse shell.bat
-
Size
953B
-
Sample
241125-pge7fasngl
-
MD5
a34e9091b3cb1b1fddb64dd1e6eafe8b
-
SHA1
73a9ce1190dbf81871d72cc98b7d81487bad17dc
-
SHA256
b79c63a1f5777b977a48085de65f8041d1d6b2d5d569224b0f81b343578f1803
-
SHA512
65391766927605aef01be482578b0f11fc9a9dfd0ee0b0a62ff1df6d07346a4b6d5a0d7409983f3fcd7b8a98e5376fd15bc8961b477be683e88ddf8e5619d0b7
Static task
static1
Malware Config
Extracted
asyncrat
Default
technical-southwest.gl.at.ply.gg:58694
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Targets
-
-
Target
reverse shell.bat
-
Size
953B
-
MD5
a34e9091b3cb1b1fddb64dd1e6eafe8b
-
SHA1
73a9ce1190dbf81871d72cc98b7d81487bad17dc
-
SHA256
b79c63a1f5777b977a48085de65f8041d1d6b2d5d569224b0f81b343578f1803
-
SHA512
65391766927605aef01be482578b0f11fc9a9dfd0ee0b0a62ff1df6d07346a4b6d5a0d7409983f3fcd7b8a98e5376fd15bc8961b477be683e88ddf8e5619d0b7
-
Asyncrat family
-
Detect Umbral payload
-
Umbral family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1