Resubmissions

28-12-2024 12:38

241228-pt81aaylhk 10

28-12-2024 12:25

241228-plre9sxqgx 10

General

  • Target

    OperaGXSetup (41).exe

  • Size

    3.8MB

  • Sample

    241228-pt81aaylhk

  • MD5

    f6a94c99deff44303f682dd2bb7d3d12

  • SHA1

    f2c6fa65a69a67a3e2120cfbb61511a495c18688

  • SHA256

    28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829

  • SHA512

    16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec

  • SSDEEP

    49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:4823

Mutex

FQ6Vi30exTDL

Attributes
  • delay

    3

  • install

    true

  • install_file

    UpdateManager.exe

  • install_folder

    %Temp%

aes.plain
aes.plain

Targets

    • Target

      OperaGXSetup (41).exe

    • Size

      3.8MB

    • MD5

      f6a94c99deff44303f682dd2bb7d3d12

    • SHA1

      f2c6fa65a69a67a3e2120cfbb61511a495c18688

    • SHA256

      28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829

    • SHA512

      16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec

    • SSDEEP

      49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks