General

  • Target

    2efe493bb7af6e276db22c15df9358e2fc72a6281d08d3bde2050653d8b285a0

  • Size

    4.8MB

  • Sample

    220521-pm3vpaaggn

  • MD5

    1bad0cd2505f7c263a861d6e85cde074

  • SHA1

    fa53e8aa6b0f25a7095ac86cbc7792f8603d4928

  • SHA256

    2efe493bb7af6e276db22c15df9358e2fc72a6281d08d3bde2050653d8b285a0

  • SHA512

    7a528ba4f46572cad00d79cc481648a9c3d3a3189cf09a81231a9b5ceff4d59fd94c4ec3c173eaf924bc2d80d73d42ab39050fa06416a78ac3989495285de1d5

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

GRACE OVERFLOW

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/Q3bqVVf9

aes.plain

Targets

    • Target

      76BVN200706awbinformation_PDF.exe

    • Size

      5.1MB

    • MD5

      1082b9039a4b9fafd5d6c40663bed8a2

    • SHA1

      7f9a433442b492d6860dcab52b4aa83bfb495222

    • SHA256

      ec4f62108a0efc101539e57198ffffaac7be084e792b43daeb4561881c0fc2f2

    • SHA512

      dfdade40ac974165dbff9e0d40be375416a7116f13e6769d366452d352562dcee65a1c7c0bf894e405d9e83a355fdcb7171b0525aaac6c4733d3eb4695efbc41

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks