General

  • Target

    Confirmation Transfer Note MT103-Ref No#01018842234595434.zip

  • Size

    240KB

  • Sample

    211115-y4t4jsbea6

  • MD5

    3242ed2e39bc9391ada19e35f4ae9586

  • SHA1

    0a9e9b1493bfc384e5531bc708e2216405131f8b

  • SHA256

    087d0d28b3c59e0ac0d169b4ece9c2a47e9bae93f93638d1ae6578adf2f3f858

  • SHA512

    96c09e4d33b99e56e59b35f298e3ef9d1b72e3c479460f51d0072eebc09e526585666dd83ce8daaf7d6b24dfd33381ce0f2667cc99920ae2e78b43b0332544d7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

fresh01.ddns.net:2245

fresh01.ddns.net:2256

fresh01.ddns.net:2257

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      Confirmation Transfer Note MT103-Ref No#01018842234595434.exe

    • Size

      316KB

    • MD5

      1b07fe1263ba5f1b86b09c9b27c1f4de

    • SHA1

      9d18786ec6506ff4f85e6c7a055828898fd59a27

    • SHA256

      daf842129f0a574f2f5cf1147d40ab8e4596b88b9ef228a4516cef5326f8f1ad

    • SHA512

      730875f1e6914ed2b2dbb585d75db63416c3acaaa02217ecbc4d73b2cd64b0865271492c1a04a483b1d521cd799949efa3a5e17c827b03a0c9ab58624d14e29f

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks