General

  • Target

    Report Details.vbs

  • Size

    11KB

  • Sample

    220329-q496rsede2

  • MD5

    319b813ad02fdd9cb8bbdec00c3774cc

  • SHA1

    e00f63367d4ee49d84ac05059f67e74351eb73e2

  • SHA256

    2f36f1a117071a9097c1ec0fff17772a029594500d6706f470899168d3b595f8

  • SHA512

    7583ba7a8f5fc126f7d73fc9c69210f4c85329af2e63d95d062fc59158f905e859a2714784b72fd235dae45f4d78fb3b17c22b6ce758377dea50b777965ab328

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://paste.ee/r/CTMue/0

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

rick63.publicvm.com:5900

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Report Details.vbs

    • Size

      11KB

    • MD5

      319b813ad02fdd9cb8bbdec00c3774cc

    • SHA1

      e00f63367d4ee49d84ac05059f67e74351eb73e2

    • SHA256

      2f36f1a117071a9097c1ec0fff17772a029594500d6706f470899168d3b595f8

    • SHA512

      7583ba7a8f5fc126f7d73fc9c69210f4c85329af2e63d95d062fc59158f905e859a2714784b72fd235dae45f4d78fb3b17c22b6ce758377dea50b777965ab328

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks