General

  • Target

    vbc.exe

  • Size

    493KB

  • Sample

    211020-m9qsjaghg3

  • MD5

    e8545399823b411ea6cb927e80aded0f

  • SHA1

    22af521e6119003289b6bd5d7be9a3328acb59cc

  • SHA256

    3d31e58a5488a2ec7fb942d3b7005b73b7a617b2b31c89aae7edf6b460edd11e

  • SHA512

    91b5f2c5fda648d4b54e5a434cb8848c3b1a51627387d552d12461adbc4f1925d3a1f23321f36e6404d6d7eff616cd428f648e5b44384f2c394e2777f0b938f6

Malware Config

Targets

    • Target

      vbc.exe

    • Size

      493KB

    • MD5

      e8545399823b411ea6cb927e80aded0f

    • SHA1

      22af521e6119003289b6bd5d7be9a3328acb59cc

    • SHA256

      3d31e58a5488a2ec7fb942d3b7005b73b7a617b2b31c89aae7edf6b460edd11e

    • SHA512

      91b5f2c5fda648d4b54e5a434cb8848c3b1a51627387d552d12461adbc4f1925d3a1f23321f36e6404d6d7eff616cd428f648e5b44384f2c394e2777f0b938f6

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Modifies WinLogon for persistence

    • Async RAT payload

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Tasks