General
-
Target
sex.exe
-
Size
6.1MB
-
Sample
250102-b45hysymbm
-
MD5
06a11d92b4c9034fde9061fce77b5dfb
-
SHA1
6421a62fff6d51f57293b669b0083ed423566d80
-
SHA256
0ff1f7a2f230eb0c641dc7951cba276cf76c678ac0c0af337360d5594eacaaf2
-
SHA512
fa147a8047023094875b2e3305126a5de8c695e814320fd818ca2736d19fa08034528400b2d3afdbde981d1f49a06d532c32d3442c167ca23d610285e31e34e0
-
SSDEEP
196608:WSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:nkSopwtQQl2aOtXADu8X9Y95GQLJ
Static task
static1
Behavioral task
behavioral1
Sample
sex.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot8152045153:AAHKgir_sbApACu0yi_YtTY7nKef4DvyTzU/getM
https://api.telegram.org/bot8152045153:AAHKgir_sbApACu0yi_YtTY7nKef4DvyTzU/sendMessage?chat_id=5318001051
Targets
-
-
Target
sex.exe
-
Size
6.1MB
-
MD5
06a11d92b4c9034fde9061fce77b5dfb
-
SHA1
6421a62fff6d51f57293b669b0083ed423566d80
-
SHA256
0ff1f7a2f230eb0c641dc7951cba276cf76c678ac0c0af337360d5594eacaaf2
-
SHA512
fa147a8047023094875b2e3305126a5de8c695e814320fd818ca2736d19fa08034528400b2d3afdbde981d1f49a06d532c32d3442c167ca23d610285e31e34e0
-
SSDEEP
196608:WSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:nkSopwtQQl2aOtXADu8X9Y95GQLJ
-
Asyncrat family
-
Gurcu family
-
Async RAT payload
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1