General

  • Target

    1660-55-0x0000000000380000-0x0000000000392000-memory.dmp

  • Size

    72KB

  • Sample

    220701-2hy26achh7

  • MD5

    9200c5f208c0740d4dcf96b1674d383e

  • SHA1

    e26e185b70b71f2b320ba466f1e0a775d961ef61

  • SHA256

    bed77ad87299dad74adb4da37fb2b8f6e082ce15aa5eab42e560453060c3375b

  • SHA512

    276d12bbf5847ea59766ca1a92a856e441cb7e7dcd0eeaa4ec2db5f596daaf9e1d89d6047a7dafcc7aa4efa48bc05af4ae1aba4b7f024ec8732d3a650029a396

Malware Config

Extracted

Family

asyncrat

Version

0.5.6D

Botnet

Default

C2

milla.publicvm.com:6606

milla.publicvm.com:7707

milla.publicvm.com:8808

Mutex

ncwfisdaribhhybik

Attributes
  • delay

    10

  • install

    true

  • install_file

    syastem.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1660-55-0x0000000000380000-0x0000000000392000-memory.dmp

    • Size

      72KB

    • MD5

      9200c5f208c0740d4dcf96b1674d383e

    • SHA1

      e26e185b70b71f2b320ba466f1e0a775d961ef61

    • SHA256

      bed77ad87299dad74adb4da37fb2b8f6e082ce15aa5eab42e560453060c3375b

    • SHA512

      276d12bbf5847ea59766ca1a92a856e441cb7e7dcd0eeaa4ec2db5f596daaf9e1d89d6047a7dafcc7aa4efa48bc05af4ae1aba4b7f024ec8732d3a650029a396

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks