General

  • Target

    Statement from NTXSD.exe

  • Size

    231KB

  • Sample

    210723-rdxc3j83dx

  • MD5

    bab69227c1d989368b0480224cdc7659

  • SHA1

    67c0a6efd1180371a572d439a330c01bb71f49fc

  • SHA256

    523110e3cb2270e27ac155a73ea6491a46ac6c8ef80f5d0172714298306415b4

  • SHA512

    c0a83fc3760a17b2c3000dfbb6b2f7cbee6fc4f91af2c3d574f550bc5fe28a0f59426ff57852e176b9a7ab4ef85a5ceb9ff9e6d09b5d67ee06850e90e8cbf015

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

212.129.4.112:6606

212.129.4.112:7707

212.129.4.112:8808

51.75.191.89:6606

51.75.191.89:7707

51.75.191.89:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    hUpxNEHNQk3CtJdHJrTmysO9IVsvpbpS

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Default

  • host

    212.129.4.112,51.75.191.89

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    6606,7707,8808

  • version

    0.5.7B

aes.plain

Targets

    • Target

      Statement from NTXSD.exe

    • Size

      231KB

    • MD5

      bab69227c1d989368b0480224cdc7659

    • SHA1

      67c0a6efd1180371a572d439a330c01bb71f49fc

    • SHA256

      523110e3cb2270e27ac155a73ea6491a46ac6c8ef80f5d0172714298306415b4

    • SHA512

      c0a83fc3760a17b2c3000dfbb6b2f7cbee6fc4f91af2c3d574f550bc5fe28a0f59426ff57852e176b9a7ab4ef85a5ceb9ff9e6d09b5d67ee06850e90e8cbf015

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Downloads MZ/PE file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks