Resubmissions

17-01-2025 14:07

250117-rfc2ss1qam 10

16-01-2025 20:28

250116-y84hsaykdl 10

General

  • Target

    Spotify.exe

  • Size

    98KB

  • Sample

    250116-y84hsaykdl

  • MD5

    e3c63db10fd82bf7005998e7536c0b73

  • SHA1

    5aa3eb6dfb0f292e92305ca6d003731faf651f4c

  • SHA256

    ecd287798f2e6597b2e4568817159e2b3b0b502990694e7bf8f58f90b73685e9

  • SHA512

    e6970b0e51474592c800c8435c92f68865160f5c25b887141fcf32db4730183f74d86a8eed9ebafeb1ea8adf8a344e8ad2f38a0c708829ae01b8954cace92a0b

  • SSDEEP

    1536:PKvg1dSJYUbdh9vTEus3DBIYGUHerbqYwhRpqKmY7:Pt1YYUbd+KYWwhqz

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

Jamuro-52920.portmap.io:52920

Attributes
  • delay

    1

  • install

    true

  • install_file

    Rmc.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Spotify.exe

    • Size

      98KB

    • MD5

      e3c63db10fd82bf7005998e7536c0b73

    • SHA1

      5aa3eb6dfb0f292e92305ca6d003731faf651f4c

    • SHA256

      ecd287798f2e6597b2e4568817159e2b3b0b502990694e7bf8f58f90b73685e9

    • SHA512

      e6970b0e51474592c800c8435c92f68865160f5c25b887141fcf32db4730183f74d86a8eed9ebafeb1ea8adf8a344e8ad2f38a0c708829ae01b8954cace92a0b

    • SSDEEP

      1536:PKvg1dSJYUbdh9vTEus3DBIYGUHerbqYwhRpqKmY7:Pt1YYUbd+KYWwhqz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Async RAT payload

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Renames multiple (348) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks