General

  • Target

    1547744O.VBS

  • Size

    2KB

  • Sample

    220428-z7aprafee7

  • MD5

    1c710652be2571bdff62812e8105eadf

  • SHA1

    8c6fede5ef62aa987050891d380eb66c62b23434

  • SHA256

    b8d6861bb63f0e06525c4d45e79e6c116c49267877174cb987a139260dec81e3

  • SHA512

    b807da2d08caf07766214e08668a40595f1ee67a9f2ebea762e6bb24f12ce55b0f97b704139ed6ed36f0deb88efb142324d687cd74c4c70728c8df2b43cd14f2

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

2

C2

anderione.com:5253

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1547744O.VBS

    • Size

      2KB

    • MD5

      1c710652be2571bdff62812e8105eadf

    • SHA1

      8c6fede5ef62aa987050891d380eb66c62b23434

    • SHA256

      b8d6861bb63f0e06525c4d45e79e6c116c49267877174cb987a139260dec81e3

    • SHA512

      b807da2d08caf07766214e08668a40595f1ee67a9f2ebea762e6bb24f12ce55b0f97b704139ed6ed36f0deb88efb142324d687cd74c4c70728c8df2b43cd14f2

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks