General

  • Target

    Solara_Protect.bat

  • Size

    475B

  • Sample

    240701-gg9r2sxflh

  • MD5

    a723d61769537cf4fec2324ee820a862

  • SHA1

    88c59fcc94048be74999b550d53432a79f9ad538

  • SHA256

    08eff7248a828c8be4cec506f4a6636998200632d53a9d3d71f1d1d881d597fd

  • SHA512

    0a06b2ed3e47f83ac6bc9133d96916251f6dfe57301a9cfd0b2c6830cba3280287147fee0bd6ed2f424107c90f2596f0083ab7320994450661c4b1fda64d0162

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

SolaraFake

C2

anyone-blogging.gl.at.ply.gg:22284

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Windows.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      Solara_Protect.bat

    • Size

      475B

    • MD5

      a723d61769537cf4fec2324ee820a862

    • SHA1

      88c59fcc94048be74999b550d53432a79f9ad538

    • SHA256

      08eff7248a828c8be4cec506f4a6636998200632d53a9d3d71f1d1d881d597fd

    • SHA512

      0a06b2ed3e47f83ac6bc9133d96916251f6dfe57301a9cfd0b2c6830cba3280287147fee0bd6ed2f424107c90f2596f0083ab7320994450661c4b1fda64d0162

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks