General

  • Target

    4961a419cdbf4653eface4b509ca87f906a4306b7565c42a1eec521a314a7be3

  • Size

    505KB

  • Sample

    210922-q93nwachb4

  • MD5

    fe281b06394f909456bf3442b3c7242c

  • SHA1

    7094d4df23e24cbfc67482a3ba79d89aa5241fd8

  • SHA256

    4961a419cdbf4653eface4b509ca87f906a4306b7565c42a1eec521a314a7be3

  • SHA512

    e7f0909f2e2bc1d79a5b75f1473e7a8baa8a289115ba13810ec7aca11a09f1fe35b91a11d253bd9c98f0b269db792973bd290558b105e29fd6892eebbe262cd6

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

17

C2

185.157.160.147:1973

Mutex

Oko9rts34dFj

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      4961a419cdbf4653eface4b509ca87f906a4306b7565c42a1eec521a314a7be3

    • Size

      505KB

    • MD5

      fe281b06394f909456bf3442b3c7242c

    • SHA1

      7094d4df23e24cbfc67482a3ba79d89aa5241fd8

    • SHA256

      4961a419cdbf4653eface4b509ca87f906a4306b7565c42a1eec521a314a7be3

    • SHA512

      e7f0909f2e2bc1d79a5b75f1473e7a8baa8a289115ba13810ec7aca11a09f1fe35b91a11d253bd9c98f0b269db792973bd290558b105e29fd6892eebbe262cd6

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks