Resubmissions

23-12-2024 00:33

241223-awp8masnbx 10

22-12-2024 22:33

241222-2gks5s1ndn 10

22-12-2024 02:35

241222-c24pbazpfq 10

General

  • Target

    https://gofile.io/d/tA2w62

  • Sample

    241223-awp8masnbx

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1314414095461777419/8hYVVlssdJOsLuwWhq5QQqRTlg-3pzMhiKB5tYVl8wS1FN6rDNu-iZ34u_-J5bahL4e7

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

127.0.0.1:625300

127.0.0.162:4449

127.0.0.162:625300

Mutex

vqdzzvcmvygkxkrxzkm

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain
aes.plain

Targets

    • Target

      https://gofile.io/d/tA2w62

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Async RAT payload

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand SLACK.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks