General

  • Target

    c59d7f337636c78922afc92241bca86e

  • Size

    1.3MB

  • Sample

    221006-vjr7nsaaa4

  • MD5

    c59d7f337636c78922afc92241bca86e

  • SHA1

    2712b3245ff84f49e72dde931f71d54a05539770

  • SHA256

    cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181

  • SHA512

    7526e6f6a6acc7b8baa16fec29e8c7ba05b5b1049f2951ef44489251b00e2c969e92d9c42c9b5be3ce273f6a42feebcba8605bcff068b7309e79b6801d5f57a7

  • SSDEEP

    12288:yrnjoa5ynWZQzjFeM6DJOjB9sTTHyzhYxwEf4N1gd2vnjc+Wk7pY9gfEqCO:VnYQb6VOp6wYQFEw

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

carlosmenguallora09.duckdns.org:1994

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      c59d7f337636c78922afc92241bca86e

    • Size

      1.3MB

    • MD5

      c59d7f337636c78922afc92241bca86e

    • SHA1

      2712b3245ff84f49e72dde931f71d54a05539770

    • SHA256

      cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181

    • SHA512

      7526e6f6a6acc7b8baa16fec29e8c7ba05b5b1049f2951ef44489251b00e2c969e92d9c42c9b5be3ce273f6a42feebcba8605bcff068b7309e79b6801d5f57a7

    • SSDEEP

      12288:yrnjoa5ynWZQzjFeM6DJOjB9sTTHyzhYxwEf4N1gd2vnjc+Wk7pY9gfEqCO:VnYQb6VOp6wYQFEw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks