General
-
Target
build.exe
-
Size
6.1MB
-
Sample
250106-szx2rasmbr
-
MD5
1fd3c7acad176220bb1c7e5a4679d0e7
-
SHA1
ee05cc5609d9cdc93f98bfec5aa63a3e679c5b17
-
SHA256
dcf52482ca002b4cd5822419886680906ddf5af41af269791e2332d039f6314f
-
SHA512
e76e47be32e49734a8d240360dc4c7f26ddac40414d73eb68ef5e54706edeaccde0e3ba99915c5c83f3e0f55412ec7fa5ec5dd7f4ede8d599ebfd8275befce93
-
SSDEEP
196608:RaiSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:QkSopwtQQl2aOtXADu8X9Y95GQLJ
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
build.exe
-
Size
6.1MB
-
MD5
1fd3c7acad176220bb1c7e5a4679d0e7
-
SHA1
ee05cc5609d9cdc93f98bfec5aa63a3e679c5b17
-
SHA256
dcf52482ca002b4cd5822419886680906ddf5af41af269791e2332d039f6314f
-
SHA512
e76e47be32e49734a8d240360dc4c7f26ddac40414d73eb68ef5e54706edeaccde0e3ba99915c5c83f3e0f55412ec7fa5ec5dd7f4ede8d599ebfd8275befce93
-
SSDEEP
196608:RaiSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:QkSopwtQQl2aOtXADu8X9Y95GQLJ
-
Asyncrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1