General

  • Target

    youtube_gh9lfOdCjAA_audio (2) (4).mp3

  • Size

    579KB

  • Sample

    250105-zr7pjsxrbj

  • MD5

    36e09440b78e3d3eb2030ab6afcb0e61

  • SHA1

    b6fa8f88c98ef55cf5977643b313f27c954fd2ed

  • SHA256

    a3c5117ed4b12ed1a1752fdc2cf01f7f10a5b305e77a1db0dde061c6df45477e

  • SHA512

    dc65a17daa7a8064e8d529f03ee228b292e6a632536d5a34e286df0a7d470eace66cab24717398cf0c125bee2ea48aa29e746648e4c75a4f6113c52eea448872

  • SSDEEP

    12288:OGgmVUJGKsaCMuKloXcmcExRH3FbezoJXK3eRsAr0c2PeJqDG3aydRbMv:O5oMDlGcmcExRH3FbeyXKOdpENqbU

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8065477619:AAEfZZh5RQYjgwBQfdZNz5uE7aPGDyhIu-8/getM

https://api.telegram.org/bot8065477619:AAEfZZh5RQYjgwBQfdZNz5uE7aPGDyhIu-8/sendMessage?chat_id=6487722506

https://api.telegram.org/bot8065477619:AAEfZZh5RQYjgwBQfdZNz5uE7aPGDyhIu-8/editMessageText?chat_id=6487722506

Targets

    • Target

      youtube_gh9lfOdCjAA_audio (2) (4).mp3

    • Size

      579KB

    • MD5

      36e09440b78e3d3eb2030ab6afcb0e61

    • SHA1

      b6fa8f88c98ef55cf5977643b313f27c954fd2ed

    • SHA256

      a3c5117ed4b12ed1a1752fdc2cf01f7f10a5b305e77a1db0dde061c6df45477e

    • SHA512

      dc65a17daa7a8064e8d529f03ee228b292e6a632536d5a34e286df0a7d470eace66cab24717398cf0c125bee2ea48aa29e746648e4c75a4f6113c52eea448872

    • SSDEEP

      12288:OGgmVUJGKsaCMuKloXcmcExRH3FbezoJXK3eRsAr0c2PeJqDG3aydRbMv:O5oMDlGcmcExRH3FbeyXKOdpENqbU

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks