General
-
Target
Infected.exe
-
Size
63KB
-
Sample
250403-znd8tswn17
-
MD5
8eecb122a1a79dcf2b800e7d9c9bb1a4
-
SHA1
4097a285a4ef1311137d6789e081fbb63849e595
-
SHA256
85716564e84fd6d1ea7ad2b54732afece9598a878703232f00031ffcdc06b694
-
SHA512
967da10e79123359c6782dbb4da961ffd2e575da52888b3772a07e3e584fe9e80807b6cd48b458f08f9e40695e62c108ed0dc610b8021202311803ae6e56a2a8
-
SSDEEP
768:Qv7M2nr/978dQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oXEcguVe3i7sSu0dP:M5/V/dSJYUbdh9yUNru0dpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win11-20250313-en
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/wXYjM7Vm
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
8eecb122a1a79dcf2b800e7d9c9bb1a4
-
SHA1
4097a285a4ef1311137d6789e081fbb63849e595
-
SHA256
85716564e84fd6d1ea7ad2b54732afece9598a878703232f00031ffcdc06b694
-
SHA512
967da10e79123359c6782dbb4da961ffd2e575da52888b3772a07e3e584fe9e80807b6cd48b458f08f9e40695e62c108ed0dc610b8021202311803ae6e56a2a8
-
SSDEEP
768:Qv7M2nr/978dQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oXEcguVe3i7sSu0dP:M5/V/dSJYUbdh9yUNru0dpqKmY7
-
Asyncrat family
-
Stealerium family
-
Renames multiple (1278) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1