General

  • Target

    HEUR-Backdoor.MSIL.Crysan.gen-387a91f2a3775ee7d2a764fa5219c63478cd497c9a0a5625d63666a7561b2640.exe

  • Size

    58KB

  • Sample

    220929-pq7caabgfm

  • MD5

    278a0cd8cf2ad02e2f2b139e78406ac9

  • SHA1

    e824197381e55771bf91fe67f3652dd0e75bd4fa

  • SHA256

    387a91f2a3775ee7d2a764fa5219c63478cd497c9a0a5625d63666a7561b2640

  • SHA512

    31bd692fe817af9de4c4aaf26d4f37011827014cf86f8a08e51e9ec77114f0130dd17dcfb9360bb141e0432f0bd9d6ecf59c609e1bb63bdc496fa0309044fbb4

  • SSDEEP

    1536:EuyRNTAGo2s7LI5ymUbZFyn62MHKdVal7:Euy/TAGo2s3I5ymUbZ462Mqval7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

92.138.188.75:7006

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    anydesk.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      HEUR-Backdoor.MSIL.Crysan.gen-387a91f2a3775ee7d2a764fa5219c63478cd497c9a0a5625d63666a7561b2640.exe

    • Size

      58KB

    • MD5

      278a0cd8cf2ad02e2f2b139e78406ac9

    • SHA1

      e824197381e55771bf91fe67f3652dd0e75bd4fa

    • SHA256

      387a91f2a3775ee7d2a764fa5219c63478cd497c9a0a5625d63666a7561b2640

    • SHA512

      31bd692fe817af9de4c4aaf26d4f37011827014cf86f8a08e51e9ec77114f0130dd17dcfb9360bb141e0432f0bd9d6ecf59c609e1bb63bdc496fa0309044fbb4

    • SSDEEP

      1536:EuyRNTAGo2s7LI5ymUbZFyn62MHKdVal7:Euy/TAGo2s3I5ymUbZ462Mqval7

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks