General

  • Target

    A4A60422374845BF0ABD892DD48D352978D697C883196.exe

  • Size

    701KB

  • Sample

    220701-2f5f6achf9

  • MD5

    1bd98c5b4581aeff9b65ce5653f49cdf

  • SHA1

    3091d81da54ed79391b456e8e94e6b939be2a316

  • SHA256

    a4a60422374845bf0abd892dd48d352978d697c883196392e0d692f70f0e85c1

  • SHA512

    f1462a6d7cfc813cd2ba05d6ccac9656b76ef4ea7418992d1b3b1acdbd779d7b2ab016322f30264c123fea92114a481c1400dc965964731c86974b98922486cc

Malware Config

Extracted

Family

asyncrat

Version

0.5.6D

Botnet

Default

C2

milla.publicvm.com:6606

milla.publicvm.com:7707

milla.publicvm.com:8808

Mutex

ncwfisdaribhhybik

Attributes
  • delay

    10

  • install

    true

  • install_file

    syastem.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      A4A60422374845BF0ABD892DD48D352978D697C883196.exe

    • Size

      701KB

    • MD5

      1bd98c5b4581aeff9b65ce5653f49cdf

    • SHA1

      3091d81da54ed79391b456e8e94e6b939be2a316

    • SHA256

      a4a60422374845bf0abd892dd48d352978d697c883196392e0d692f70f0e85c1

    • SHA512

      f1462a6d7cfc813cd2ba05d6ccac9656b76ef4ea7418992d1b3b1acdbd779d7b2ab016322f30264c123fea92114a481c1400dc965964731c86974b98922486cc

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks