General
-
Target
F-M-E_v2.rar
-
Size
4.9MB
-
Sample
250103-brcbmswqeq
-
MD5
04ab2868e69ddc80d80dc6d278dd205c
-
SHA1
09f3a4781db1714a57c5cc2cd7ae947fab8dc89a
-
SHA256
400d369932fb22d062fec4558547b2b36459b90ebf418522b5bd79ec726b04bd
-
SHA512
408776ae323396e24a2dcb04dcf1e651bdd99de8a677b1b9875a7517127db8da0f180b582f1a8eaf7288af8c851e89a68c7135b4dba4e4fb46b12dfedd2f80ba
-
SSDEEP
98304:No5e3S2MMfKhCfH1cEdjSFs6iWLYtpLxwLfszx9Xb3XR0fHi1Ax9s2ur0T:No5eC2UCfH17Y+0YrV0fszxphmiuxS25
Static task
static1
Behavioral task
behavioral1
Sample
F-M-E_v2/F-M-Е_v2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
F-M-E_v2/F-M-Е_v2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
F-M-E_v2/crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
F-M-E_v2/crack.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
F-M-E_v2/F-M-Е_v2.exe
-
Size
1.2MB
-
MD5
9e1ea15e3c048ed96c22a8e50bf83b8b
-
SHA1
071a3420cf14fcb1ff96e33daa64f60ee92ac1e6
-
SHA256
699050ce6a9803d066b0d5206dc946c1c54ae8ebc6e9bc7fa18836e9dc8ce46e
-
SHA512
2c397b0f2d677e7d63ca607a72f85c5368dfbf8bb2036eec4ce53e597e8598972700ccd267de0696b40d0da5a99579ac3e7db5873c146b10cd22e75d0cc70afd
-
SSDEEP
24576:acVkKSRXajM/0IV5diCURXnWvxxMiGh5Sq7Ttz8J:acBYXa+0kYCkn4giGhZvtz8J
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
F-M-E_v2/crack.exe
-
Size
3.6MB
-
MD5
b7882c8eeb5328a78cc3ea7b6b389695
-
SHA1
174ad6cf4a52901e23f4346b9866ab88fcf9ec7a
-
SHA256
52278c5c508198f8628a8c32687e63d5420e4940d2845aa963804dbee45ae737
-
SHA512
170a6142fa81b45b20d234e91b63c4cbe5b5155126f921a7c8839ed01bc1ee0e0fe116fc3515fb7909b3cf77a22bac3830acf2cd12c02249f8814509e8f82da5
-
SSDEEP
98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB
-
Asyncrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1