General

  • Target

    016D808DD3D45A17F7230BFE8DF690D2B75C18BD93F44.exe

  • Size

    48KB

  • Sample

    220630-1q2mksdbg3

  • MD5

    747973b0b920bcace8ebf382a3edd701

  • SHA1

    6923e0e2e6b5813578142446fd48744bef443f67

  • SHA256

    016d808dd3d45a17f7230bfe8df690d2b75c18bd93f44f60badf12924f4266b0

  • SHA512

    814c0a9787a2012ae3c61a1c43c9cc68bd50b3bd3fed634003d6274c93f987abcea79e41e12caea61658ffab7b69f3b76934a69e9eda8d96ca325e9b83c71c27

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

spk.accesscam.org:55555

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    google.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      016D808DD3D45A17F7230BFE8DF690D2B75C18BD93F44.exe

    • Size

      48KB

    • MD5

      747973b0b920bcace8ebf382a3edd701

    • SHA1

      6923e0e2e6b5813578142446fd48744bef443f67

    • SHA256

      016d808dd3d45a17f7230bfe8df690d2b75c18bd93f44f60badf12924f4266b0

    • SHA512

      814c0a9787a2012ae3c61a1c43c9cc68bd50b3bd3fed634003d6274c93f987abcea79e41e12caea61658ffab7b69f3b76934a69e9eda8d96ca325e9b83c71c27

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks