General

  • Target

    1bf55c75f582331db0b200e69ea81ec708abdc47ebcd1e7308fcff046dec46fd

  • Size

    294KB

  • Sample

    220521-dxxwmsgeb9

  • MD5

    e7895470727996f92992b778835ed427

  • SHA1

    5a7bd87ad0b80971322cf24d11b7a5e11d4c4651

  • SHA256

    1bf55c75f582331db0b200e69ea81ec708abdc47ebcd1e7308fcff046dec46fd

  • SHA512

    c21d4c867883a771e61c7d316b7f4d5a79d2b861099c88e6f5b095b3d3246814165b8812c33b170aa64601bb3a0e6ac1f3bd5c408d195d46652d997d71fd8374

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

MAY11thUP

Mutex

chizzy25@!7^UP

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/HKYwiN9V

aes.plain

Targets

    • Target

      AWB#5305323204641,pdf.exe

    • Size

      233KB

    • MD5

      88e05a7f3b27e3aed5d577949c867917

    • SHA1

      180a4cabbb5ea319ff1210f5686c7779d0dd58c7

    • SHA256

      f3b33a885af940210f10df7e1c96dc388161961dcb52b6d84c3b7458d20ce116

    • SHA512

      3d42bc7888584efea5d8a0a48b6293c54405d0186f3d8a45741f4e371ee143a5d1411be8f69dbe5aa5957b8dbad921100872206408a431849de4c826db875bbe

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • Async RAT payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks