General

  • Target

    bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6

  • Size

    852KB

  • Sample

    210921-kjqnqsghf7

  • MD5

    41deb852009dee8341b1862142c45e79

  • SHA1

    29d04c1ab468338690fd75e11a595ba3a52a0b11

  • SHA256

    bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6

  • SHA512

    d5eb21bca7661ec9d1ae35f804b8c0e5282db2ebab3bfb5f85bee45323a38418021143b71e1b1d6dc66592c81034d6657315923ddb9db678d3956b1ed23e905d

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

20.203.178.116:2070

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6

    • Size

      852KB

    • MD5

      41deb852009dee8341b1862142c45e79

    • SHA1

      29d04c1ab468338690fd75e11a595ba3a52a0b11

    • SHA256

      bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6

    • SHA512

      d5eb21bca7661ec9d1ae35f804b8c0e5282db2ebab3bfb5f85bee45323a38418021143b71e1b1d6dc66592c81034d6657315923ddb9db678d3956b1ed23e905d

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks