General

  • Target

    Inquiry 14 MARCH 2022.doc

  • Size

    8KB

  • Sample

    220314-xf75tsbaf2

  • MD5

    7e923f9ed71605c75cec4a39d9ae9115

  • SHA1

    e298bd1e7090016119eb69d8eaa158b04046026a

  • SHA256

    a78f33c16f2dda006e42cd86aa82adb522c24c9bd2c7583c70007a8a58649b07

  • SHA512

    e5371b267ba5c87c2cf3eb9f1b0ad26dbaee15bbe150af3a4537555a9235fe7dfde85d36d48515b149f8911d46970abd9a0160d17d264c8bf95cce768ba34796

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

2

C2

212.193.30.54:9524

Mutex

wyQ92!.,=FT72few

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      Inquiry 14 MARCH 2022.doc

    • Size

      8KB

    • MD5

      7e923f9ed71605c75cec4a39d9ae9115

    • SHA1

      e298bd1e7090016119eb69d8eaa158b04046026a

    • SHA256

      a78f33c16f2dda006e42cd86aa82adb522c24c9bd2c7583c70007a8a58649b07

    • SHA512

      e5371b267ba5c87c2cf3eb9f1b0ad26dbaee15bbe150af3a4537555a9235fe7dfde85d36d48515b149f8911d46970abd9a0160d17d264c8bf95cce768ba34796

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks