General

  • Target

    5bc149b7d429710d7539e6de3b655a11.exe

  • Size

    208KB

  • Sample

    220928-t1ykcagee4

  • MD5

    5bc149b7d429710d7539e6de3b655a11

  • SHA1

    7e32474bb18bad87408c0e8379acf563224dd5f4

  • SHA256

    367286675076c14b4d7adedc674cd1902200003f703975bbfae71f5dfcdc18a6

  • SHA512

    3a08d5571f4b0ce71a5d92a459b465c04d91a55abbf0ca5ebfc1d888ba10c1f50f0f5ec5ad8e1619d8403af154fd2af3536c26a7ca5d2a61fbee1028421f6648

  • SSDEEP

    1536:sugPNTcI42LJ0dU33bIXSXLlgR6MdDID9tn4ICYlx:sug1TcI42LKG33bIJRNVW9tn4IDlx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

2.59.119.84:7943

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    zula.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      5bc149b7d429710d7539e6de3b655a11.exe

    • Size

      208KB

    • MD5

      5bc149b7d429710d7539e6de3b655a11

    • SHA1

      7e32474bb18bad87408c0e8379acf563224dd5f4

    • SHA256

      367286675076c14b4d7adedc674cd1902200003f703975bbfae71f5dfcdc18a6

    • SHA512

      3a08d5571f4b0ce71a5d92a459b465c04d91a55abbf0ca5ebfc1d888ba10c1f50f0f5ec5ad8e1619d8403af154fd2af3536c26a7ca5d2a61fbee1028421f6648

    • SSDEEP

      1536:sugPNTcI42LJ0dU33bIXSXLlgR6MdDID9tn4ICYlx:sug1TcI42LKG33bIJRNVW9tn4IDlx

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks