General
-
Target
1.rar
-
Size
60.0MB
-
Sample
241229-1ca8gaxpbr
-
MD5
90e89a99902228321213b23f957df499
-
SHA1
fc5125d59e819dc71cacc17151d705ac1d5b59ac
-
SHA256
037f1419e6450599732d5bd564cc85d9a807fad7688789a8c5e854df947471b1
-
SHA512
6b35ee81b180251af99481678cc1e27d0ca40fd64d35589171efa077161980ff9e6d16e716832930ae36426fc93e9fe1f637966a08ed4540cc59ec0d9909f88a
-
SSDEEP
1572864:iBcdL6f0UbnoAWLzZgqxQHQQs2pemdv9FOc:dk0YVWJyQvA/dlFOc
Static task
static1
Behavioral task
behavioral1
Sample
1.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
0oj3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
interception.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
netlimiter-5.3.18.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
onnxruntime.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
opencv_world490.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.6.1
service
193.57.137.78:5555
Q8ghiNEV5vpA
-
delay
3
-
install
true
-
install_file
cmd.exe
-
install_folder
%Temp%
Targets
-
-
Target
1.rar
-
Size
60.0MB
-
MD5
90e89a99902228321213b23f957df499
-
SHA1
fc5125d59e819dc71cacc17151d705ac1d5b59ac
-
SHA256
037f1419e6450599732d5bd564cc85d9a807fad7688789a8c5e854df947471b1
-
SHA512
6b35ee81b180251af99481678cc1e27d0ca40fd64d35589171efa077161980ff9e6d16e716832930ae36426fc93e9fe1f637966a08ed4540cc59ec0d9909f88a
-
SSDEEP
1572864:iBcdL6f0UbnoAWLzZgqxQHQQs2pemdv9FOc:dk0YVWJyQvA/dlFOc
-
Asyncrat family
-
Creates new service(s)
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
0oj3.exe
-
Size
37.0MB
-
MD5
d57050cc8f1d71bb068a181301146855
-
SHA1
564deb2344ea43dd519ee0000642cb0ced55da83
-
SHA256
08058004805b7054e6dd6c55e1aebfa356cddd46167aae7de4322d4c3ae79db1
-
SHA512
43af8130465347d06e23838bc652a94b8d06518d81c40f32f87d78d87a485ae23b13d7585f3e05f0231b9f6f59e383b98617b268519d1c6742b7309c1da494e4
-
SSDEEP
786432:b/gO+cE2+qOnY9ZBLcf5jJGlbarkt0PAmyrL+rXrO37:bEcEGbLwjubcktYbO37
Score10/10-
Asyncrat family
-
Creates new service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
interception.dll
-
Size
11KB
-
MD5
fe8b2a022297aa36a3546391221f635a
-
SHA1
346e04907eb628372f459fbbf109b6cff57cac13
-
SHA256
ab88164c11b1b48488772d4c3bfaa4509d5b0ae9dbc5a691dc4f96f0260443c8
-
SHA512
fa203db607cb1154f7ac84e64b236b19ff29abab1b443609648ee3fafa53581c22420edd1f5ed2c522ab7f3c2577c73822eafbf143a8c80914a3061193b10a1c
-
SSDEEP
192:wBKz1mGyRWIddjlkuSCqPDKSyFVzhveZhAk3M+j4sreC:EKsGyRhdtlkuSCLS8VcZhP344
Score1/10 -
-
-
Target
libcrypto-3-x64.dll
-
Size
4.5MB
-
MD5
dc0b5510731cbf1cb12859b137efedfe
-
SHA1
4925f0c77fd32cf2f8eab916d00872d0bc9324e2
-
SHA256
fd92dbc1a720ef43d53a6c3536ab05ccc78b5efe768cc3624d4f7b3cf0d02132
-
SHA512
1adc1e36445d1125703675b7a47beaef05992a2ef5051a6513973f16dee374bf72085ffb26d502295d1c69283a56578d8bb59b432f9087102c5bb5e93a49ddb4
-
SSDEEP
98304:wl+kK7ppVSns2jW/aJPr4v1CPwDvt3uFGCC:ME7Xgns2jW/aJT4v1CPwDvt3uFGCC
Score1/10 -
-
-
Target
netlimiter-5.3.18.0.exe
-
Size
10.3MB
-
MD5
77fe4dda11353dac7bab0a5b0ff751ad
-
SHA1
a13bea60fa99cfc1e817b40b2b299d917e08266b
-
SHA256
99ce75543755df63697610e00ce334564ce4d931d726ffb57d65a8a2679298de
-
SHA512
82349624eb88036fd70539b2485b805242ae22f4c6c1bde3b72a8113d1cd1c47314c58d8358828e74b50a165fdae295c941d06cf7e834b704fb4251da76f71c3
-
SSDEEP
196608:o5gk9KH9q0poBp26sb+WCgdMKQyo4Onak2LRJMloJvgFWAIe2y13NWZ:xeKdFmYtbDkdhakFUYFWAIe1HWZ
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
onnxruntime.dll
-
Size
11.0MB
-
MD5
8c218c52a99f6c536438242dc99a8006
-
SHA1
d31dc3ad0a9578975b4b0ed895d27d65d9768cc0
-
SHA256
52f8ebe8f08f369a44fed6d1cb680c7c89169795e1c2949ee25b88b538ef0948
-
SHA512
5163d8d81989fd45506d540ccdba990bf4e613dc6438841cb812d7c92069aa643aff509903595dd9fdf542cb580b8937bb6fa016e9f2d463958d37fbd5b7092e
-
SSDEEP
49152:zmHgraNrq7OUb4XWiWfYS6r64dAyb8sXLwqLgD5W/2llE8ieFEryMYg8xgpLeqik:URswL7YW2j6nMUhxtpbL3Of2RLHWLZE
Score1/10 -
-
-
Target
opencv_world490.dll
-
Size
62.0MB
-
MD5
45aa348d9487722dec3b6e6fcc3a7d96
-
SHA1
6a1f66b321566c723fc956c0efb3cafa61bcffe8
-
SHA256
3fd426744146afe5c714912068bd3d0fba2c7f66d2d44c34c750bd10c55d5795
-
SHA512
af301f10918cc12cb50694332ccdeaa8c343ce69fb813f973f575d6c50dde90ab69ad1e211d22d5868d0532b1adf4859c56966bb4aee300110080a364100c84c
-
SSDEEP
393216:pQ1Q1QUmWUcVTeSv6hz07JrwANw/MteylqZQPhU+Ux6o+LBnzMwLiAU0nUNDPrK:pPhJr9rUQznpnUF+
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1