General

  • Target

    51e4092cc2b507c07cc5b5dd34ac507ef02302fd2b3ad60912d9719a46ec7228

  • Size

    411KB

  • Sample

    220414-hpe33sadgm

  • MD5

    d879fac9c6581b1c2760b883402cc494

  • SHA1

    0769ec09dad81a27a50589563eba1b0c3b236335

  • SHA256

    51e4092cc2b507c07cc5b5dd34ac507ef02302fd2b3ad60912d9719a46ec7228

  • SHA512

    3407f8f23ff8afd486a218284bfa4cb84edc2109aead0c6cce424df7cae36c6012b1f96088dc044065451d1f2926b0fea3bec39e5a04cbebd8e55fdb9bacc615

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

213.226.119.28:6606

213.226.119.28:7707

213.226.119.28:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      51e4092cc2b507c07cc5b5dd34ac507ef02302fd2b3ad60912d9719a46ec7228

    • Size

      411KB

    • MD5

      d879fac9c6581b1c2760b883402cc494

    • SHA1

      0769ec09dad81a27a50589563eba1b0c3b236335

    • SHA256

      51e4092cc2b507c07cc5b5dd34ac507ef02302fd2b3ad60912d9719a46ec7228

    • SHA512

      3407f8f23ff8afd486a218284bfa4cb84edc2109aead0c6cce424df7cae36c6012b1f96088dc044065451d1f2926b0fea3bec39e5a04cbebd8e55fdb9bacc615

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks