General

  • Target

    PetSim99GUI.exe

  • Size

    48KB

  • Sample

    250120-j9nrdszpft

  • MD5

    f5fa1fb705307bd25ca0d0408b8d6684

  • SHA1

    31dffff48303612d94d4c10083ade7c6b3b777a3

  • SHA256

    1659db1c128cc72c1d5db8ec73a93cc89cc684f00a4c2b83b76fef32af45fe07

  • SHA512

    a2803bf7b0662893c1bbc5f2bf876690e57fbf611225cfd968cd04d9c3a005b3d71b27e2df8003ddfa2fcf353691957ea27b119dad88073f8adc9d5114abd246

  • SSDEEP

    768:OugvNTjgkH7F7WUHF9pmo2q7cJ/IP8Xjog1VPI0HgmP0i0bc64EU7XoEFmSwBqRb:OugvNTcIb2te3gE0H6dbcjE+z5vdzH

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

letsgetdigging.hopto.org:6606

Mutex

gwp6EO1O6Isj

Attributes
  • delay

    3

  • install

    true

  • install_file

    PS99.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      PetSim99GUI.exe

    • Size

      48KB

    • MD5

      f5fa1fb705307bd25ca0d0408b8d6684

    • SHA1

      31dffff48303612d94d4c10083ade7c6b3b777a3

    • SHA256

      1659db1c128cc72c1d5db8ec73a93cc89cc684f00a4c2b83b76fef32af45fe07

    • SHA512

      a2803bf7b0662893c1bbc5f2bf876690e57fbf611225cfd968cd04d9c3a005b3d71b27e2df8003ddfa2fcf353691957ea27b119dad88073f8adc9d5114abd246

    • SSDEEP

      768:OugvNTjgkH7F7WUHF9pmo2q7cJ/IP8Xjog1VPI0HgmP0i0bc64EU7XoEFmSwBqRb:OugvNTcIb2te3gE0H6dbcjE+z5vdzH

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Modifies Windows Defender Real-time Protection settings

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks