General

  • Target

    f04f2fa00dcafc7ca9edb63361a64391f07cebef57d865582a5e9a2852768058

  • Size

    5.9MB

  • Sample

    220630-ve9wxsefh8

  • MD5

    5285d5ec7bebb746e9293937f993976c

  • SHA1

    f498637b7eef3ea3080f3fbfe38ab0435d684702

  • SHA256

    f04f2fa00dcafc7ca9edb63361a64391f07cebef57d865582a5e9a2852768058

  • SHA512

    6b5bba28caffab1df60681857a1b4dee0692ac19c99de86cec2d6d7a16a0bb1f15ac02bc1d8f1c0fdaa3cba9ef0f429536a1614ee479077c0fb443fdb2d2ae1f

Malware Config

Targets

    • Target

      f04f2fa00dcafc7ca9edb63361a64391f07cebef57d865582a5e9a2852768058

    • Size

      5.9MB

    • MD5

      5285d5ec7bebb746e9293937f993976c

    • SHA1

      f498637b7eef3ea3080f3fbfe38ab0435d684702

    • SHA256

      f04f2fa00dcafc7ca9edb63361a64391f07cebef57d865582a5e9a2852768058

    • SHA512

      6b5bba28caffab1df60681857a1b4dee0692ac19c99de86cec2d6d7a16a0bb1f15ac02bc1d8f1c0fdaa3cba9ef0f429536a1614ee479077c0fb443fdb2d2ae1f

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Creates new service(s)

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Privilege Escalation

New Service

1
T1050

Tasks