General

  • Target

    APROBACION DE PAGO REALIZADO EXITOSAMENTE.exe

  • Size

    8.9MB

  • Sample

    221005-3jwtvsfhg7

  • MD5

    705385c167486ac75a5063f6934c5631

  • SHA1

    d08da29cca536b6b502cec7ca2f5c9cb419308e2

  • SHA256

    558af040bcfa1aaf774e953cca682eaaf38ec8c4f3ca4f3e24e0ea8a783ca1df

  • SHA512

    67249411406d7a6f41a97a6e40facd364fb6777c2833465aacdc6081fde3854109c9a308f5dc6f03c6fd940cc2d291be7ce9b13c6dc5a45dc810d091e98d88af

  • SSDEEP

    98304:7soxgg0Y8w5AUY52JgpVOEjrZGNw9J2/8w1MlpYRO1izoaRIS9NhICGucHATgwY0:p8Aohi8Y/+y

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

maraddiego763.duckdns.org:1881

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      APROBACION DE PAGO REALIZADO EXITOSAMENTE.exe

    • Size

      8.9MB

    • MD5

      705385c167486ac75a5063f6934c5631

    • SHA1

      d08da29cca536b6b502cec7ca2f5c9cb419308e2

    • SHA256

      558af040bcfa1aaf774e953cca682eaaf38ec8c4f3ca4f3e24e0ea8a783ca1df

    • SHA512

      67249411406d7a6f41a97a6e40facd364fb6777c2833465aacdc6081fde3854109c9a308f5dc6f03c6fd940cc2d291be7ce9b13c6dc5a45dc810d091e98d88af

    • SSDEEP

      98304:7soxgg0Y8w5AUY52JgpVOEjrZGNw9J2/8w1MlpYRO1izoaRIS9NhICGucHATgwY0:p8Aohi8Y/+y

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Detected google phishing page

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

4
T1089

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks