General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.32273.exe

  • Size

    600KB

  • Sample

    220922-jzy5daafd2

  • MD5

    655c3cfd372078ec727db7ea441dbbe5

  • SHA1

    6146b002d887018beba46382ddb00cde6cd9000e

  • SHA256

    85d51d3e98e442cac4177b4bc0ddca270454f0c4a75bd2c3269ec366eb434a3f

  • SHA512

    112ce25d22068ce9cd4a3a527ab2a715ee33798ed9157daf9ec42c00cd238ee8288a726afe36b34463da9cb55e3f1f6db358f6d36926c5dcad7ed3126536fcab

  • SSDEEP

    6144:a7Ks2qIjWxejKi/i/iiDYOfNODk6b1h5os5b9ByxqvJnxyYb1qAyZrvHvw0PpYaK:a3xhKKDHlY5oc1xyguJHVEd0V

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

hardrickkonsultg.ddns.net:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.32273.exe

    • Size

      600KB

    • MD5

      655c3cfd372078ec727db7ea441dbbe5

    • SHA1

      6146b002d887018beba46382ddb00cde6cd9000e

    • SHA256

      85d51d3e98e442cac4177b4bc0ddca270454f0c4a75bd2c3269ec366eb434a3f

    • SHA512

      112ce25d22068ce9cd4a3a527ab2a715ee33798ed9157daf9ec42c00cd238ee8288a726afe36b34463da9cb55e3f1f6db358f6d36926c5dcad7ed3126536fcab

    • SSDEEP

      6144:a7Ks2qIjWxejKi/i/iiDYOfNODk6b1h5os5b9ByxqvJnxyYb1qAyZrvHvw0PpYaK:a3xhKKDHlY5oc1xyguJHVEd0V

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks