General

  • Target

    ce23492949ee720fc6d508e892fc7989ede3b3c89c7227e1e1735155c2735607

  • Size

    144KB

  • Sample

    221001-pjfwragad3

  • MD5

    3601d4384b2490d9d92bf66badcdd6b8

  • SHA1

    14d9a33e4da6f7e1aca41bf7de5525230c26c7aa

  • SHA256

    ce23492949ee720fc6d508e892fc7989ede3b3c89c7227e1e1735155c2735607

  • SHA512

    33f7a0bc00a418290226984cf91adb80d3d4850dff89b8582a670c476fe65cc5879d84d473feea452d319f10304e9b20bfed2f6d85bdb5ad9552451fcf6cdcba

  • SSDEEP

    3072:xntcyrZRhq/ndCy1mhoIV4C/3Lo/9x/5IZu:syMnEy1vIVd/3Az/KZu

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

45.154.98.214:6606

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

1

C2

93.159.221.122:8387

Extracted

Family

redline

Botnet

fud

C2

45.15.156.7:48638

Attributes
  • auth_value

    da2faefdcf53c9d85fcbb82d0cbf4876

Targets

    • Target

      ce23492949ee720fc6d508e892fc7989ede3b3c89c7227e1e1735155c2735607

    • Size

      144KB

    • MD5

      3601d4384b2490d9d92bf66badcdd6b8

    • SHA1

      14d9a33e4da6f7e1aca41bf7de5525230c26c7aa

    • SHA256

      ce23492949ee720fc6d508e892fc7989ede3b3c89c7227e1e1735155c2735607

    • SHA512

      33f7a0bc00a418290226984cf91adb80d3d4850dff89b8582a670c476fe65cc5879d84d473feea452d319f10304e9b20bfed2f6d85bdb5ad9552451fcf6cdcba

    • SSDEEP

      3072:xntcyrZRhq/ndCy1mhoIV4C/3Lo/9x/5IZu:syMnEy1vIVd/3Az/KZu

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks