General

  • Target

    Infected.exe

  • Size

    63KB

  • Sample

    250401-egv8jsszbv

  • MD5

    fed0b60effd8cab7e785fc3873ef3b92

  • SHA1

    a083c6049c44010287b867e5112361d56c829bed

  • SHA256

    a4fb56b773918ec655178306ffa105b0eba503dc772bd8a71af298194a3d7f8f

  • SHA512

    9d4af762624f8314a23f03329d7121982df4b16354fca3211bd12a3b252505a5896fffd1c075672b7defac16d951960ba8e532cbe2abc3995b0f759accd4e124

  • SSDEEP

    768:ZJiBeNf5g78fIC8A+XayazcBRL5JTk1+T4KSBGHmDbD/ph0oXT47VSukdpqKYhY7:Oq5UZdSJYUbdh9T4AukdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

f9t

C2

127.0.0.1:1111

127.0.0.1:34057

rules-binary.gl.at.ply.gg:1111

rules-binary.gl.at.ply.gg:34057

Attributes
  • delay

    1

  • install

    true

  • install_file

    test.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Infected.exe

    • Size

      63KB

    • MD5

      fed0b60effd8cab7e785fc3873ef3b92

    • SHA1

      a083c6049c44010287b867e5112361d56c829bed

    • SHA256

      a4fb56b773918ec655178306ffa105b0eba503dc772bd8a71af298194a3d7f8f

    • SHA512

      9d4af762624f8314a23f03329d7121982df4b16354fca3211bd12a3b252505a5896fffd1c075672b7defac16d951960ba8e532cbe2abc3995b0f759accd4e124

    • SSDEEP

      768:ZJiBeNf5g78fIC8A+XayazcBRL5JTk1+T4KSBGHmDbD/ph0oXT47VSukdpqKYhY7:Oq5UZdSJYUbdh9T4AukdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks