General
-
Target
build.exe
-
Size
3.6MB
-
Sample
241229-qmjbqasnbj
-
MD5
159cb32f97f5a5297b9ef46e16556631
-
SHA1
d9a2cee6035f972e395015c0847ffd491a65b284
-
SHA256
452c77d9be7b82107a1325d98f75d0194e61c311e4fa7204a15b52e42bc3c2d2
-
SHA512
6e974f974d1cb3104e20a51cbe7a636bd81af111ff64784f58a3194acaf6970545436cdc9ee6182a58c168e5aed68a3929baddf0c5227743496ee252136c1e77
-
SSDEEP
98304:2kqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13C:2kSIlLtzWAXAkuujCPX9YG9he5GnQCAL
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot8186028481:AAFwGBBD5b2kT-q-75Ksfw-nU1TMlE5m8y0/getM
https://api.telegram.org/bot8186028481:AAFwGBBD5b2kT-q-75Ksfw-nU1TMlE5m8y0/sendMessage?chat_id=5685021465
Targets
-
-
Target
build.exe
-
Size
3.6MB
-
MD5
159cb32f97f5a5297b9ef46e16556631
-
SHA1
d9a2cee6035f972e395015c0847ffd491a65b284
-
SHA256
452c77d9be7b82107a1325d98f75d0194e61c311e4fa7204a15b52e42bc3c2d2
-
SHA512
6e974f974d1cb3104e20a51cbe7a636bd81af111ff64784f58a3194acaf6970545436cdc9ee6182a58c168e5aed68a3929baddf0c5227743496ee252136c1e77
-
SSDEEP
98304:2kqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13C:2kSIlLtzWAXAkuujCPX9YG9he5GnQCAL
-
Asyncrat family
-
Gurcu family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1