General

  • Target

    Good.ps1

  • Size

    1KB

  • Sample

    220926-y3tfmadaen

  • MD5

    f352e9ea5b48e556410878e8204434f5

  • SHA1

    3e6be512bdf272021faf840ce76d149631c322f5

  • SHA256

    e05a116bf80f3d77481a9962caa9d0d8544f287dfd6b6c865054e8ea9c9f6826

  • SHA512

    8d08c60a887dec659abfae2f10fadb426640d3e3a56394b18b382dd0c43759c6dd7504f6fe17a720cd7c412bf6f97ae8f9fb0940ee11b3a64891446218444b21

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

worldpassed.publicvm.com:199

Mutex

AsyncMutex_6SI8OkBrC

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Good.ps1

    • Size

      1KB

    • MD5

      f352e9ea5b48e556410878e8204434f5

    • SHA1

      3e6be512bdf272021faf840ce76d149631c322f5

    • SHA256

      e05a116bf80f3d77481a9962caa9d0d8544f287dfd6b6c865054e8ea9c9f6826

    • SHA512

      8d08c60a887dec659abfae2f10fadb426640d3e3a56394b18b382dd0c43759c6dd7504f6fe17a720cd7c412bf6f97ae8f9fb0940ee11b3a64891446218444b21

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • UAC bypass

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks