General

  • Target

    Fancourier 09032200754RO.doc

  • Size

    9KB

  • Sample

    220314-xemgqsbad8

  • MD5

    afaba454894f4a81bd7bddab3deec9f2

  • SHA1

    f781efbf3b7270e429a79e7410db0b1c62a502e2

  • SHA256

    0ee87c38a46c1e2c3e7d21e0108b12b78b2083eee3bb9beee031fcd6340d3632

  • SHA512

    931e8c92a64501439b002400cd1d38392c44fd7a4819796d0aebe06f5a9f612d0da74048217c3ab53cf92a14be260732971560646a1701bf49c5b8171ef3a72a

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

2

C2

212.193.30.54:9524

Mutex

wyQ92!.,=FT72few

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      Fancourier 09032200754RO.doc

    • Size

      9KB

    • MD5

      afaba454894f4a81bd7bddab3deec9f2

    • SHA1

      f781efbf3b7270e429a79e7410db0b1c62a502e2

    • SHA256

      0ee87c38a46c1e2c3e7d21e0108b12b78b2083eee3bb9beee031fcd6340d3632

    • SHA512

      931e8c92a64501439b002400cd1d38392c44fd7a4819796d0aebe06f5a9f612d0da74048217c3ab53cf92a14be260732971560646a1701bf49c5b8171ef3a72a

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks