General

  • Target

    tmp

  • Size

    73KB

  • Sample

    220702-yezmqsbcb8

  • MD5

    e8032d887188081e383a6ebd6dbcd33a

  • SHA1

    ccbd2b7b1dc9688098636bf4a778ae1e5e90dd17

  • SHA256

    6fc5883456ca655a74a91c3127486ab5c21186308fdebfca4ec9035e09d7069a

  • SHA512

    21babd4ff02d906274256c9a6defd85843f08d56a863c4f127f873652cb9b6205e13c581e6eed4ef51f617b4b85efcd87c7473398712131e21ace792fb235060

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

vivald21.hopto.org:9954

63.141.237.188:9954

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      tmp

    • Size

      73KB

    • MD5

      e8032d887188081e383a6ebd6dbcd33a

    • SHA1

      ccbd2b7b1dc9688098636bf4a778ae1e5e90dd17

    • SHA256

      6fc5883456ca655a74a91c3127486ab5c21186308fdebfca4ec9035e09d7069a

    • SHA512

      21babd4ff02d906274256c9a6defd85843f08d56a863c4f127f873652cb9b6205e13c581e6eed4ef51f617b4b85efcd87c7473398712131e21ace792fb235060

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks