General
-
Target
spoofer.exe
-
Size
3.6MB
-
Sample
241228-y1yybsskan
-
MD5
9316ff653c4cb2798b93c8933f43e61b
-
SHA1
6c260ac0087aabb66b893afc3ef0955b982aea77
-
SHA256
297e4ac9c22cf38b58241d60e16e4395ade705ca15769b796e9dbfcb5ac12aec
-
SHA512
03ba1ab43684307f1b9aada2e7330bf65ca664f100610d69891bff2b3bbd5198cbc4da00967993bf8891cde79ab4128737b944ac97e9a14de3109e3262919bc0
-
SSDEEP
98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB
Static task
static1
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spoofer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
spoofer.exe
-
Size
3.6MB
-
MD5
9316ff653c4cb2798b93c8933f43e61b
-
SHA1
6c260ac0087aabb66b893afc3ef0955b982aea77
-
SHA256
297e4ac9c22cf38b58241d60e16e4395ade705ca15769b796e9dbfcb5ac12aec
-
SHA512
03ba1ab43684307f1b9aada2e7330bf65ca664f100610d69891bff2b3bbd5198cbc4da00967993bf8891cde79ab4128737b944ac97e9a14de3109e3262919bc0
-
SSDEEP
98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB
-
Asyncrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1