General
-
Target
youtube_gh9lfOdCjAA_audio (2) (4).mp3
-
Size
579KB
-
Sample
250105-zr7pjsxrbj
-
MD5
36e09440b78e3d3eb2030ab6afcb0e61
-
SHA1
b6fa8f88c98ef55cf5977643b313f27c954fd2ed
-
SHA256
a3c5117ed4b12ed1a1752fdc2cf01f7f10a5b305e77a1db0dde061c6df45477e
-
SHA512
dc65a17daa7a8064e8d529f03ee228b292e6a632536d5a34e286df0a7d470eace66cab24717398cf0c125bee2ea48aa29e746648e4c75a4f6113c52eea448872
-
SSDEEP
12288:OGgmVUJGKsaCMuKloXcmcExRH3FbezoJXK3eRsAr0c2PeJqDG3aydRbMv:O5oMDlGcmcExRH3FbeyXKOdpENqbU
Static task
static1
Behavioral task
behavioral1
Sample
youtube_gh9lfOdCjAA_audio (2) (4).mp3
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
youtube_gh9lfOdCjAA_audio (2) (4).mp3
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot8065477619:AAEfZZh5RQYjgwBQfdZNz5uE7aPGDyhIu-8/getM
https://api.telegram.org/bot8065477619:AAEfZZh5RQYjgwBQfdZNz5uE7aPGDyhIu-8/sendMessage?chat_id=6487722506
https://api.telegram.org/bot8065477619:AAEfZZh5RQYjgwBQfdZNz5uE7aPGDyhIu-8/editMessageText?chat_id=6487722506
Targets
-
-
Target
youtube_gh9lfOdCjAA_audio (2) (4).mp3
-
Size
579KB
-
MD5
36e09440b78e3d3eb2030ab6afcb0e61
-
SHA1
b6fa8f88c98ef55cf5977643b313f27c954fd2ed
-
SHA256
a3c5117ed4b12ed1a1752fdc2cf01f7f10a5b305e77a1db0dde061c6df45477e
-
SHA512
dc65a17daa7a8064e8d529f03ee228b292e6a632536d5a34e286df0a7d470eace66cab24717398cf0c125bee2ea48aa29e746648e4c75a4f6113c52eea448872
-
SSDEEP
12288:OGgmVUJGKsaCMuKloXcmcExRH3FbezoJXK3eRsAr0c2PeJqDG3aydRbMv:O5oMDlGcmcExRH3FbeyXKOdpENqbU
-
Asyncrat family
-
Gurcu family
-
Async RAT payload
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1