General

  • Target

    Anarchy Panel.rar

  • Size

    53.7MB

  • Sample

    250215-p3jfzsskas

  • MD5

    5dc9c6fd4edbd148791b562f00876187

  • SHA1

    a2505b95d41ce293b2b2301bcb6d182266efd7aa

  • SHA256

    cd61b22206c6d49921a64d25afe25f378c5a2a9adb5cbb9bde6b8710a9b69ae2

  • SHA512

    c786dce92af961aa108222735a96cc3bc5be2d1406f205b5d5d6ebbf1835088fbab8d594259868f303cce50808ab4a52b18732dc6a343379c9b3419572c555fe

  • SSDEEP

    1572864:ptM3JU8MZutgbxMwJimb8+iq7JRCctUvKYo8+:HMJB9wJis8+ieRMKYo8+

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Anarchy Panel.rar

    • Size

      53.7MB

    • MD5

      5dc9c6fd4edbd148791b562f00876187

    • SHA1

      a2505b95d41ce293b2b2301bcb6d182266efd7aa

    • SHA256

      cd61b22206c6d49921a64d25afe25f378c5a2a9adb5cbb9bde6b8710a9b69ae2

    • SHA512

      c786dce92af961aa108222735a96cc3bc5be2d1406f205b5d5d6ebbf1835088fbab8d594259868f303cce50808ab4a52b18732dc6a343379c9b3419572c555fe

    • SSDEEP

      1572864:ptM3JU8MZutgbxMwJimb8+iq7JRCctUvKYo8+:HMJB9wJis8+ieRMKYo8+

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Async RAT payload

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks