General

  • Target

    Stealer.exe

  • Size

    10.2MB

  • Sample

    250129-kdwb2asmc1

  • MD5

    41d910d583bb0000139e4ba501b85ed3

  • SHA1

    3f6385ebe1cfb5a9498b5a24eb18e356b4e89731

  • SHA256

    2bd89e81853bbc112cfeb62b676beb0cfc741262bf9e226e15768062e6a14d6a

  • SHA512

    1580ba5c349e73e38fe899e7498a644bba4c62e95e6c740d330308692916d2f9375af43d560d9041d1b38a5b22e105f687a9f811b7310e396d3590abd1b00fad

  • SSDEEP

    196608:HB7XMxQfsWshAvneXaRxoWpVvjQeuRzTB1WcWrRfVuKcFOrRV5/oRKG9zh:h78xQkWshmNoWTvHQTBatoOrJA0GZh

Malware Config

Extracted

Family

asyncrat

Botnet

FUCKED UP BY CODEX17

C2

105.101.179.171:38672

Attributes
  • delay

    1

  • install

    true

  • install_file

    Anti Spyware core service.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

hall-shine.gl.at.ply.gg:37734

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7581317328:AAHSOYBRXtxAC4eNoBHxtvJwUlAqgnnRcoc/sendMessage?chat_id=6229207397

Targets

    • Target

      Stealer.exe

    • Size

      10.2MB

    • MD5

      41d910d583bb0000139e4ba501b85ed3

    • SHA1

      3f6385ebe1cfb5a9498b5a24eb18e356b4e89731

    • SHA256

      2bd89e81853bbc112cfeb62b676beb0cfc741262bf9e226e15768062e6a14d6a

    • SHA512

      1580ba5c349e73e38fe899e7498a644bba4c62e95e6c740d330308692916d2f9375af43d560d9041d1b38a5b22e105f687a9f811b7310e396d3590abd1b00fad

    • SSDEEP

      196608:HB7XMxQfsWshAvneXaRxoWpVvjQeuRzTB1WcWrRfVuKcFOrRV5/oRKG9zh:h78xQkWshmNoWTvHQTBatoOrJA0GZh

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks