General

  • Target

    93df1c272022c2a5bc8bcb8247ffc932837ea4de9f6044da8953a3a1078ab018

  • Size

    486KB

  • Sample

    220704-j97jhaffbl

  • MD5

    273f2c55c1982fc3ec6450639609f38a

  • SHA1

    02db2875babca34c81f4979134cba8422c7ef262

  • SHA256

    93df1c272022c2a5bc8bcb8247ffc932837ea4de9f6044da8953a3a1078ab018

  • SHA512

    a65de5f5bf0f47c399108f6b59405327be7a1037a2b6597a5eef4b13c3483347885a86a6662770bd34a8aea61445ac29cab93e330739453922dcbacf7b743e38

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

vivald21.hopto.org:9954

63.141.237.188:9954

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      93df1c272022c2a5bc8bcb8247ffc932837ea4de9f6044da8953a3a1078ab018

    • Size

      486KB

    • MD5

      273f2c55c1982fc3ec6450639609f38a

    • SHA1

      02db2875babca34c81f4979134cba8422c7ef262

    • SHA256

      93df1c272022c2a5bc8bcb8247ffc932837ea4de9f6044da8953a3a1078ab018

    • SHA512

      a65de5f5bf0f47c399108f6b59405327be7a1037a2b6597a5eef4b13c3483347885a86a6662770bd34a8aea61445ac29cab93e330739453922dcbacf7b743e38

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks