General

  • Target

    6244bdface5bf2ec0ab400f9db947965.exe

  • Size

    402KB

  • Sample

    220308-wdfgcshhe4

  • MD5

    6244bdface5bf2ec0ab400f9db947965

  • SHA1

    45fb8ac87b2e2af7ccefbfa8ab7d7eb514af833d

  • SHA256

    abbc7c74c2cb191f07cf02c63619d67f3f07439b1e761f62b18bf578d3ac754f

  • SHA512

    1b6269819dd03e787010880ed550bb6d5f2293cc1402d45bce4c63a99f2b099193e37da8971f8de30e3d5bad705afb82b27541ccd77b43fc34437d40f6553a9d

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

2

C2

212.193.30.54:9524

Mutex

wyQ92!.,=FT72few

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      6244bdface5bf2ec0ab400f9db947965.exe

    • Size

      402KB

    • MD5

      6244bdface5bf2ec0ab400f9db947965

    • SHA1

      45fb8ac87b2e2af7ccefbfa8ab7d7eb514af833d

    • SHA256

      abbc7c74c2cb191f07cf02c63619d67f3f07439b1e761f62b18bf578d3ac754f

    • SHA512

      1b6269819dd03e787010880ed550bb6d5f2293cc1402d45bce4c63a99f2b099193e37da8971f8de30e3d5bad705afb82b27541ccd77b43fc34437d40f6553a9d

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks