Resubmissions

23/03/2025, 12:57

250323-p6wwgs1thw 10

23/03/2025, 12:31

250323-pqa9vazybv 10

General

  • Target

    Infected (1).zip

  • Size

    29KB

  • Sample

    250323-pqa9vazybv

  • MD5

    bc0de07976b768198dde7b01cc2dd5ae

  • SHA1

    c5b4585226e99a2d87f397532b719a4f9baa7f74

  • SHA256

    1ec4b145a87d112642b4ecf8d6dad2dbea8e3142a445d653e2421348a2d9afc7

  • SHA512

    c2e441027ec17d74222424490933b91bad7d1076d42e458bac6b92b1a5d410f67e8214823a7f3c868fe253aa06296c3a6d630c97d0467467179fe9f9a7de1666

  • SSDEEP

    768:2yH06w92Pf6WgQyT+qLbc6srv+L8qFEpHNXePVUYYnw:24zHf6fAqL3srv+4qFEhNeVonw

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

27.ip.gl.ply.gg:12362

147.185.221.27:12362

according-asks.gl.at.ply.gg:12362

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Infected.exe

    • Size

      63KB

    • MD5

      f42f55956743758432a268841e68bbd6

    • SHA1

      f623961c98ae744960c9fc997fa6fd772a17d6e2

    • SHA256

      1946c5429eff2cec7b13cf088dedbfabb40f4231bb9016e028eb9e876483a3ee

    • SHA512

      e5f6624f16d3185b89ccf25c69f0b330d596c868b5e2bc2248a84bae787cdc015982acabb7c415ec7479314513a8d05cdb3fb4b0b4bdc19146589c70fd2ebe2f

    • SSDEEP

      768:VFVsjkUAON78iHC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXG9lOHruSuDdpqM:VwAOJ9dSJYUbdh9G45uDdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Renames multiple (3658) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Enterprise v15

Tasks