General

  • Target

    1132-55-0x00000000001B0000-0x00000000001C2000-memory.dmp

  • Size

    72KB

  • Sample

    220928-2xrxdsadcn

  • MD5

    a2a1ec32758c6f5c529f644fd2cf318e

  • SHA1

    66df3abe410de08e1f8bbc9c7b578a4976a3779f

  • SHA256

    e6f0283036672588e88f985e2b4bd4784bb3bab373ba07630d25b6779063f03c

  • SHA512

    688f9d24321d813225ce1b835b48d05cbd5f75044a07103fecd64d649ae892c2c631235a7cd1d1cbd8ae7f0c8936ccc021671116ba82cadcae05a1b986ea1440

  • SSDEEP

    1536:Uov5MNQ9AUVebWrSRzxrEH3mEr5KmVcl:Uov5MNQ6UVebWAxSmE9K8Y

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.6D

Botnet

Default

C2

milla.publicvm.com:6606

milla.publicvm.com:7707

milla.publicvm.com:8808

Mutex

nqjzitvqsflofawip

Attributes
  • delay

    6

  • install

    true

  • install_file

    facaboooke.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1132-55-0x00000000001B0000-0x00000000001C2000-memory.dmp

    • Size

      72KB

    • MD5

      a2a1ec32758c6f5c529f644fd2cf318e

    • SHA1

      66df3abe410de08e1f8bbc9c7b578a4976a3779f

    • SHA256

      e6f0283036672588e88f985e2b4bd4784bb3bab373ba07630d25b6779063f03c

    • SHA512

      688f9d24321d813225ce1b835b48d05cbd5f75044a07103fecd64d649ae892c2c631235a7cd1d1cbd8ae7f0c8936ccc021671116ba82cadcae05a1b986ea1440

    • SSDEEP

      1536:Uov5MNQ9AUVebWrSRzxrEH3mEr5KmVcl:Uov5MNQ6UVebWAxSmE9K8Y

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks