General

  • Target

    aebf016b75a0461729b84255f307d279a60675a8769affdb69f9ad68ba9b86b3.zip

  • Size

    145KB

  • Sample

    210915-ktbbssddbq

  • MD5

    5bf04f79c8111c58ff270a48838a550e

  • SHA1

    ab8ef93934030b4526691781ac3550e417832543

  • SHA256

    01b992ca30617c156d0d6c7e209b39b044099c1c71f1114fc4045b226b3e9582

  • SHA512

    9cd46607e22f3b80e342e537a2c117f3480b9b2ad151b3eafe2546fad288e80a6119dc64e07e3556eb94927ab7767f16b35cc94c190f7d248fb9e40fc307c779

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

WIRE$$$$$$$$

C2

severdops.ddns.net:6204

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    true

  • install_file

    iconfx.exe

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      aebf016b75a0461729b84255f307d279a60675a8769affdb69f9ad68ba9b86b3.exe

    • Size

      585KB

    • MD5

      02179909185ee25814dd4ea226540021

    • SHA1

      d54bd08e2c4b7aa3971eff0ee15ac064889c1f5b

    • SHA256

      aebf016b75a0461729b84255f307d279a60675a8769affdb69f9ad68ba9b86b3

    • SHA512

      6933dcc2d81d62d12756436df4f8bde39fe1ccb868b73a323153dbb360059cb82111d5ff134c43269879cf8dbb9b69a17732fccbfa927295e87a82831dea9105

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks