General

  • Target

    411255W.iso

  • Size

    64KB

  • Sample

    220428-z3ah7acbfm

  • MD5

    910bee1a06aacddbfa5117efd31048cf

  • SHA1

    1eb76f9c66deec401a40bd258be56e3d41acebab

  • SHA256

    520ac8627622243d245e44af86961d43dd5bf4887295af246a35e9e354bc4b55

  • SHA512

    f77b888b9180d385d3a98dd5d03a38fe02be07d1d88f8a7bccb35ce868840be84de57908a26df556a00421b98f64b8889dd768c1b588ff7c3ea234d667be8dd9

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

2

C2

anderione.com:5253

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1547744O.VBS

    • Size

      2KB

    • MD5

      1c710652be2571bdff62812e8105eadf

    • SHA1

      8c6fede5ef62aa987050891d380eb66c62b23434

    • SHA256

      b8d6861bb63f0e06525c4d45e79e6c116c49267877174cb987a139260dec81e3

    • SHA512

      b807da2d08caf07766214e08668a40595f1ee67a9f2ebea762e6bb24f12ce55b0f97b704139ed6ed36f0deb88efb142324d687cd74c4c70728c8df2b43cd14f2

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks