General

  • Target

    3564-586-0x0000000000D70000-0x00000000016CC000-memory.dmp

  • Size

    9.4MB

  • Sample

    240622-cjr8kawgjr

  • MD5

    4e970cf3977ff2c7e655904839c9ec92

  • SHA1

    783a1ae2b547f81f81c6516a719e625b49733606

  • SHA256

    871e54c8224dc17a578a0897b675e8b111b1c7060031cae105c3cb83952d325d

  • SHA512

    16b9f0b9575078786465a84a168479567dbb5d4e7682a0e2e6689d01012b3b3d83d723e6c960088f2032c1cb2b7221783230f60a890ac8afe8a9cf54c2ecbc43

  • SSDEEP

    98304:n/FgpI4E+Lb8SoqAh7ziTMotYBR8hbLocrRKjbE+R9V+EKS9tRjNcqeFl5XODzTu:b+wo68NoctSVrV1X5vT+N

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

95.142.46.3:4449

95.142.46.3:7000

Mutex

zlgcqgmshzbvhurfz

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3564-586-0x0000000000D70000-0x00000000016CC000-memory.dmp

    • Size

      9.4MB

    • MD5

      4e970cf3977ff2c7e655904839c9ec92

    • SHA1

      783a1ae2b547f81f81c6516a719e625b49733606

    • SHA256

      871e54c8224dc17a578a0897b675e8b111b1c7060031cae105c3cb83952d325d

    • SHA512

      16b9f0b9575078786465a84a168479567dbb5d4e7682a0e2e6689d01012b3b3d83d723e6c960088f2032c1cb2b7221783230f60a890ac8afe8a9cf54c2ecbc43

    • SSDEEP

      98304:n/FgpI4E+Lb8SoqAh7ziTMotYBR8hbLocrRKjbE+R9V+EKS9tRjNcqeFl5XODzTu:b+wo68NoctSVrV1X5vT+N

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks