General

  • Target

    ev0lve.exe

  • Size

    43.3MB

  • Sample

    220825-145amaceh7

  • MD5

    302cf996807bbe8cae7e62932a869e4f

  • SHA1

    f2156b482cc02f57935547117cb08b57c578e15d

  • SHA256

    39f55931d53ae2b48822ef75d2409d313311ae429aea5f320df51d623aebc82e

  • SHA512

    e52039dfb62adb3f1af98b3122c192126fba25b0a400b42839ac8c6363d7fdfb16923d8bb3b2483a262c7bd0b9b5d7cd3aa8faa8e5aabc416042bd5797fb1135

  • SSDEEP

    786432:MSdhVv6+LSXK4MvJt+Yy22K3Jn76g+NzsszyJ+UfyVmdSKquP+1ttXXZVOob/CWZ:J3mOAYCbN5UfyVQWuP+rJXNbd

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

6.tcp.eu.ngrok.io:1604

6.tcp.eu.ngrok.io:4040

6.tcp.eu.ngrok.io:12320

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    Microsoft.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      ev0lve.exe

    • Size

      43.3MB

    • MD5

      302cf996807bbe8cae7e62932a869e4f

    • SHA1

      f2156b482cc02f57935547117cb08b57c578e15d

    • SHA256

      39f55931d53ae2b48822ef75d2409d313311ae429aea5f320df51d623aebc82e

    • SHA512

      e52039dfb62adb3f1af98b3122c192126fba25b0a400b42839ac8c6363d7fdfb16923d8bb3b2483a262c7bd0b9b5d7cd3aa8faa8e5aabc416042bd5797fb1135

    • SSDEEP

      786432:MSdhVv6+LSXK4MvJt+Yy22K3Jn76g+NzsszyJ+UfyVmdSKquP+1ttXXZVOob/CWZ:J3mOAYCbN5UfyVQWuP+rJXNbd

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks