Resubmissions

31/03/2025, 18:00

250331-wlak3svtby 10

31/03/2025, 17:58

250331-wkcztavtbt 10

28/03/2025, 19:30

250328-x72gcsskw6 10

General

  • Target

    bba2d6bfae4be91d6ad87d5ab7791ec443d2b0f07515247d451341fce7eaab40

  • Size

    9.3MB

  • Sample

    250331-wlak3svtby

  • MD5

    a8b38553a21704b9176f5b0e30176395

  • SHA1

    350b4ee960048b48ce0e691a3c5183d12d931e8d

  • SHA256

    bba2d6bfae4be91d6ad87d5ab7791ec443d2b0f07515247d451341fce7eaab40

  • SHA512

    fb5e2c3da8fa937629bdd55e889cb6a57066cbb56c048a58d3ccbe1a09eb17d4ef6e78fb5ba9171a48668767286eb2d39803d7ad103d8f11600b7f749bdd45f7

  • SSDEEP

    196608:/0Cq6VRQBBfqF15gbOgsF4GoKZk/G6QwxJJvfv0X5BM/O2Ie+EegtG8:TVoxQ5gbOl4GoKZ1RYJJvj/L+EegtV

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

20.199.83.63:8080

Mutex

ceqyzqxvsux

Attributes
  • delay

    1

  • install

    true

  • install_file

    das.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Grabberhydra.exe

    • Size

      9.4MB

    • MD5

      1a0e1a239d2d4f4d9f9e2f968eed9f27

    • SHA1

      6e1da96ce51570a3f158500390d1148f2cbc2f77

    • SHA256

      0f3b73e169942ba5ed7d17ad2965f821b8939fe23b6422a1284982b72db2fff8

    • SHA512

      7c48f6ec212b74aa5502cbc612932d56dd02ab9ecbabf9f0c090840e12180a09c31f8d46377157a23c39f568a5f52fba986b1cee0b614191b2a1cc39a11ddc77

    • SSDEEP

      196608:2W2cxg3+cemXyuSyTde8BRHvUWvofhxjno/w3iFCxHQbRpXDugkn:n2N3GtByxjBRHdAxro/w3uCxHQbzu3n

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Hydra.exe

    • Size

      74KB

    • MD5

      78ab7dfadb3813980dc8ad8620c7d95f

    • SHA1

      9e0e1fc73ec77341164b536010f0fc5a523ff668

    • SHA256

      7e2bb9f90d504bb61da3b8949d6c8eb78cfd65f800e6281f61d0bf8f46e11746

    • SHA512

      06d4f2a194511d50e2691c045af7bc1795ddf9d07e628495e8c21876e291dae6b16254175adfe9b679e348039241de126ad78cfeec42b171403571afb0304f1b

    • SSDEEP

      1536:CUme0cxFVTuCGbPMVymD7a3ISH1b0/WNlNQrQzciLVclN:CUm3cxFVaBbPMVS7H1b0uNlqrQzBY

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

MITRE ATT&CK Enterprise v15

Tasks