General

  • Target

    ACMI Subcharter_Request_Details_Oct21.vbs

  • Size

    23KB

  • Sample

    211022-rgmmmacfck

  • MD5

    08206197037259d3688ee82e96038282

  • SHA1

    18d384bd77fe0db2240b7003d66325f4b719634a

  • SHA256

    32388440f2029970ac962532bebaed0c5536e219be8bcad759a3895f7a05b575

  • SHA512

    7a431efb4369f4ab162f27ccd269712299800e0721e7dd6d2242bbb93c12b2d4b212728760602c257118b799503c91f99c949ecbba6462261640b8890acfb35e

Score
10/10

Malware Config

Targets

    • Target

      ACMI Subcharter_Request_Details_Oct21.vbs

    • Size

      23KB

    • MD5

      08206197037259d3688ee82e96038282

    • SHA1

      18d384bd77fe0db2240b7003d66325f4b719634a

    • SHA256

      32388440f2029970ac962532bebaed0c5536e219be8bcad759a3895f7a05b575

    • SHA512

      7a431efb4369f4ab162f27ccd269712299800e0721e7dd6d2242bbb93c12b2d4b212728760602c257118b799503c91f99c949ecbba6462261640b8890acfb35e

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks