BL. NO. ANSMUNDAR3621.exe

General
Target

BL. NO. ANSMUNDAR3621.exe

Filesize

343KB

Completed

21-10-2021 12:40

Score
10/10
MD5

6e313f49084c58fcd006489103bac31a

SHA1

cfb76b45950b867da23054c1df26ce8e7a3f8274

SHA256

408e8ea1cbe31a44e822f1673cbfbe79dbd2938a1e449e61a661c1cceda8f322

Malware Config

Extracted

Family asyncrat
Version 0.5.7B
Botnet Default
C2

185.222.57.71:00783

Attributes
anti_vm
false
bsod
false
delay
3
install
false
install_folder
%AppData%
pastebin_config
null
aes.plain
Signatures 6

Filter: none

  • AsyncRat

    Description

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload

    Tags

    Reported IOCs

    resourceyara_rule
    behavioral2/memory/2756-127-0x0000000000400000-0x0000000000412000-memory.dmpasyncrat
    behavioral2/memory/2756-128-0x000000000040C70E-mapping.dmpasyncrat
  • Suspicious use of SetThreadContext
    BL. NO. ANSMUNDAR3621.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 688 set thread context of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
  • Suspicious behavior: EnumeratesProcesses
    BL. NO. ANSMUNDAR3621.exe

    Reported IOCs

    pidprocess
    688BL. NO. ANSMUNDAR3621.exe
    688BL. NO. ANSMUNDAR3621.exe
  • Suspicious use of AdjustPrivilegeToken
    BL. NO. ANSMUNDAR3621.exeRegSvcs.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege688BL. NO. ANSMUNDAR3621.exe
    Token: SeDebugPrivilege2756RegSvcs.exe
  • Suspicious use of WriteProcessMemory
    BL. NO. ANSMUNDAR3621.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
    PID 688 wrote to memory of 2756688BL. NO. ANSMUNDAR3621.exeRegSvcs.exe
Processes 2
  • C:\Users\Admin\AppData\Local\Temp\BL. NO. ANSMUNDAR3621.exe
    "C:\Users\Admin\AppData\Local\Temp\BL. NO. ANSMUNDAR3621.exe"
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      Suspicious use of AdjustPrivilegeToken
      PID:2756
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/688-118-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

                          • memory/688-120-0x00000000058D0000-0x00000000058D1000-memory.dmp

                          • memory/688-121-0x00000000053D0000-0x00000000053D1000-memory.dmp

                          • memory/688-122-0x0000000005370000-0x0000000005371000-memory.dmp

                          • memory/688-123-0x0000000005570000-0x0000000005577000-memory.dmp

                          • memory/688-124-0x00000000053D0000-0x00000000058CE000-memory.dmp

                          • memory/688-125-0x0000000006170000-0x0000000006171000-memory.dmp

                          • memory/688-126-0x0000000005890000-0x00000000058BD000-memory.dmp

                          • memory/2756-127-0x0000000000400000-0x0000000000412000-memory.dmp

                          • memory/2756-128-0x000000000040C70E-mapping.dmp

                          • memory/2756-131-0x00000000055C0000-0x00000000055C1000-memory.dmp

                          • memory/2756-134-0x00000000060C0000-0x00000000060C1000-memory.dmp