General

  • Target

    Recos du CA -7-10-2021.xlam

  • Size

    18KB

  • Sample

    211025-r8ljmsgcf3

  • MD5

    8e6c120a1c08991264a0590dd3807695

  • SHA1

    e35537f228c49115b459ec29838d0e843340a41d

  • SHA256

    c78851f760dccafdf503acca672e44d350e7ad3f1e128b6c75a45f18a43167eb

  • SHA512

    ca7860aacc5677fb66b3b3539fff8f5061afc82197d62dd1cc75627c87efefa6614a525ae851f71ea81c127d6f6551065e762d91ace9a1a6989613249d2ef036

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Hacked

C2

toornavigator.sytes.net:5500

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_file

    notepad.exe

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      Recos du CA -7-10-2021.xlam

    • Size

      18KB

    • MD5

      8e6c120a1c08991264a0590dd3807695

    • SHA1

      e35537f228c49115b459ec29838d0e843340a41d

    • SHA256

      c78851f760dccafdf503acca672e44d350e7ad3f1e128b6c75a45f18a43167eb

    • SHA512

      ca7860aacc5677fb66b3b3539fff8f5061afc82197d62dd1cc75627c87efefa6614a525ae851f71ea81c127d6f6551065e762d91ace9a1a6989613249d2ef036

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Async RAT payload

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks