General

  • Target

    F-M-E_v2.rar

  • Size

    4.9MB

  • Sample

    250103-brcbmswqeq

  • MD5

    04ab2868e69ddc80d80dc6d278dd205c

  • SHA1

    09f3a4781db1714a57c5cc2cd7ae947fab8dc89a

  • SHA256

    400d369932fb22d062fec4558547b2b36459b90ebf418522b5bd79ec726b04bd

  • SHA512

    408776ae323396e24a2dcb04dcf1e651bdd99de8a677b1b9875a7517127db8da0f180b582f1a8eaf7288af8c851e89a68c7135b4dba4e4fb46b12dfedd2f80ba

  • SSDEEP

    98304:No5e3S2MMfKhCfH1cEdjSFs6iWLYtpLxwLfszx9Xb3XR0fHi1Ax9s2ur0T:No5eC2UCfH17Y+0YrV0fszxphmiuxS25

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      F-M-E_v2/F-M-Е_v2.exe

    • Size

      1.2MB

    • MD5

      9e1ea15e3c048ed96c22a8e50bf83b8b

    • SHA1

      071a3420cf14fcb1ff96e33daa64f60ee92ac1e6

    • SHA256

      699050ce6a9803d066b0d5206dc946c1c54ae8ebc6e9bc7fa18836e9dc8ce46e

    • SHA512

      2c397b0f2d677e7d63ca607a72f85c5368dfbf8bb2036eec4ce53e597e8598972700ccd267de0696b40d0da5a99579ac3e7db5873c146b10cd22e75d0cc70afd

    • SSDEEP

      24576:acVkKSRXajM/0IV5diCURXnWvxxMiGh5Sq7Ttz8J:acBYXa+0kYCkn4giGhZvtz8J

    Score
    7/10
    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Target

      F-M-E_v2/crack.exe

    • Size

      3.6MB

    • MD5

      b7882c8eeb5328a78cc3ea7b6b389695

    • SHA1

      174ad6cf4a52901e23f4346b9866ab88fcf9ec7a

    • SHA256

      52278c5c508198f8628a8c32687e63d5420e4940d2845aa963804dbee45ae737

    • SHA512

      170a6142fa81b45b20d234e91b63c4cbe5b5155126f921a7c8839ed01bc1ee0e0fe116fc3515fb7909b3cf77a22bac3830acf2cd12c02249f8814509e8f82da5

    • SSDEEP

      98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks