General

  • Target

    unifyworld.bat

  • Size

    82KB

  • Sample

    221008-j7zqwaeegp

  • MD5

    78f209baa76e9331b563a3aabb439732

  • SHA1

    94a9fa43bf4fed618cbc707f7a6d9d0860ad6077

  • SHA256

    dec300bc7f59fa5250a44f3300797ec2b2e72006be9a63f567477e95b776f9dc

  • SHA512

    fa41c6b70e2aeb6b5a175d8a01bf17519c204bb51c4124a2bcaabc561039c65a24682c94a1330b6c7f67964de662449335dc99735ccc831642e60c77deaf267f

  • SSDEEP

    192:wR7KNVqYFQqwxqYgQFYNpdiohUPOzfXwQ9:+QVqYFQqwxqYgQFYNpdioQObXwQ

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

andojan.ddns.net:6606

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      OutPut2.bat

    • Size

      21KB

    • MD5

      c32b1f1bb8eda7a1e148c1cdf014f23b

    • SHA1

      af0cc28285fc57632751f970ba3040bb1af2faa0

    • SHA256

      8a0dc53293a9c974b1884f315f724024713523a6cc95e5bb4abee5fdaf79a9b6

    • SHA512

      f7d04d94d7dbabcf7aff4493745660efd65321c2d3e1c2a5c2fea4d02ecbcf90d77e322ef13d257ae263aadbd4cab6a4f237b349b8be0e3e30e3e31f6732980e

    • SSDEEP

      96:VMzFOMzFJMzFLMzFeMzFzMzFJMzFTMzFiMzFJMzFLMzFUHQeMzFLMzF2MzFqMzFN:OVqYFQqwxqYgQFYNpdiohUPOzfXwQ9j

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks