General
-
Target
OperaGXSetup (41).exe
-
Size
3.8MB
-
Sample
241228-pt81aaylhk
-
MD5
f6a94c99deff44303f682dd2bb7d3d12
-
SHA1
f2c6fa65a69a67a3e2120cfbb61511a495c18688
-
SHA256
28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829
-
SHA512
16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec
-
SSDEEP
49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv
Static task
static1
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:4823
FQ6Vi30exTDL
-
delay
3
-
install
true
-
install_file
UpdateManager.exe
-
install_folder
%Temp%
Targets
-
-
Target
OperaGXSetup (41).exe
-
Size
3.8MB
-
MD5
f6a94c99deff44303f682dd2bb7d3d12
-
SHA1
f2c6fa65a69a67a3e2120cfbb61511a495c18688
-
SHA256
28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829
-
SHA512
16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec
-
SSDEEP
49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv
-
Asyncrat family
-
Async RAT payload
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1