General

  • Target

    0491601a5cda328f6712c4b7c2dc2380315a8bcf7e47d9329a23a8e1ee6378e2

  • Size

    336KB

  • Sample

    220521-pp2emsahhp

  • MD5

    784e9402ffaddc245cd4b9ad713f224f

  • SHA1

    9df02287c0eb005c45c554aad4f2c979a6e803d0

  • SHA256

    0491601a5cda328f6712c4b7c2dc2380315a8bcf7e47d9329a23a8e1ee6378e2

  • SHA512

    2806ca69ca1a0fe564c0a9b871b31f8fae56899f7f15f3da868a7a78f8e9f44320418f7355b9de7e3f4ada8a1dcafd593dae3bf349706e0371525fc067fda1e4

Malware Config

Extracted

Family

asyncrat

Version

0.5.6D

Botnet

TINOTINO

C2

185.165.153.215:6606

Mutex

uqeolevmck

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Disposable Protective Mask.exe

    • Size

      561KB

    • MD5

      6f254eb4843ee683a0c43e340bfe8840

    • SHA1

      82b24614b10237c4b8ab9b31a860555be00667b7

    • SHA256

      82f23154db8360127ad3fbcab71948019b0e2904c1ec65d5045722f6ee91fdce

    • SHA512

      2ed7a8a383366eefb4e2fe6d23f97f2ba24b992c315d6cdde6069e2e76910413a77c20b5da71ac74b35e8bfd05f36951225afbca8035b35a82d763d49ff65d19

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • Async RAT payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks