General

  • Target

    ebbbaf78fb4ef9b58f32c49786d5f9ae422ed9159a44e9146eee4350aad61f92

  • Size

    478KB

  • Sample

    210916-zkw98shbgn

  • MD5

    77105c1d2dbccff8e8dba3e3f97993b7

  • SHA1

    4baeb08805da8b7045b47720979fbb1365a585a4

  • SHA256

    ebbbaf78fb4ef9b58f32c49786d5f9ae422ed9159a44e9146eee4350aad61f92

  • SHA512

    bd6374ade1734e2d3dc36f98e93dd2c96ff5fd80fc1e3c6d847dec0c18a7bb6037a32dace1795570b7a18a593cf045a4305f337d55300658874f4569660914ca

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

17

C2

185.157.160.147:1973

Mutex

Oko9rts34dFj

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      ebbbaf78fb4ef9b58f32c49786d5f9ae422ed9159a44e9146eee4350aad61f92

    • Size

      478KB

    • MD5

      77105c1d2dbccff8e8dba3e3f97993b7

    • SHA1

      4baeb08805da8b7045b47720979fbb1365a585a4

    • SHA256

      ebbbaf78fb4ef9b58f32c49786d5f9ae422ed9159a44e9146eee4350aad61f92

    • SHA512

      bd6374ade1734e2d3dc36f98e93dd2c96ff5fd80fc1e3c6d847dec0c18a7bb6037a32dace1795570b7a18a593cf045a4305f337d55300658874f4569660914ca

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks