General

  • Target

    hesaphareketi-01.PDF.exe

  • Size

    229KB

  • Sample

    211025-r1xxpshben

  • MD5

    4f9755ece444cee7ea092710166c6013

  • SHA1

    8b8cac77932e536e05aed7a87bd100c05314e1fa

  • SHA256

    471164d02703f1ced569a65a45461ef1b4ffefe10a8c28128f99f9c80a5ee36f

  • SHA512

    9c8f6f97b0abb919c4d461dcc768667f32ff8e0f0b42042c0133b87aa2ddf616a68f3e072419f3f578e8ce3661c6a59c9982259b3aed70341c21ef4c43de702a

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

cigdem5.duckdns.org:6606

cigdem5.duckdns.org:7707

cigdem5.duckdns.org:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      hesaphareketi-01.PDF.exe

    • Size

      229KB

    • MD5

      4f9755ece444cee7ea092710166c6013

    • SHA1

      8b8cac77932e536e05aed7a87bd100c05314e1fa

    • SHA256

      471164d02703f1ced569a65a45461ef1b4ffefe10a8c28128f99f9c80a5ee36f

    • SHA512

      9c8f6f97b0abb919c4d461dcc768667f32ff8e0f0b42042c0133b87aa2ddf616a68f3e072419f3f578e8ce3661c6a59c9982259b3aed70341c21ef4c43de702a

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • UAC bypass

    • Windows security bypass

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Nirsoft

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

5
T1089

Bypass User Account Control

1
T1088

Discovery

System Information Discovery

2
T1082

Tasks