General

  • Target

    996-55-0x0000000000380000-0x0000000000392000-memory.dmp

  • Size

    72KB

  • Sample

    221009-zc4dkshhhk

  • MD5

    c0741c5f09e005636c81946e1c821474

  • SHA1

    c81bd945e8870bb33e38182289bd9294c3c8ba7f

  • SHA256

    b9bdfaa517d5e41d4d2916336229fc6b273d81d800c5faa70c5aadb2b50c8fb8

  • SHA512

    9abf032b19264800ee51450dd49d1c86764371d4020cad75356149c54ef596b52f877097be1ab9c3e195fba2d52fda255d7286ef857904a65b47f6b4b4732c5c

  • SSDEEP

    768:QoDRMt9b8i9K4GR2VNuIx2FAhQ7CbEjbegr3iaxgvUroz0ClZN2tYcFmVc6K:QoDRMth9U2hfEbhrSjUroz5rNKmVcl

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.6D

Botnet

Default

C2

milla.publicvm.com:6606

milla.publicvm.com:7707

milla.publicvm.com:8808

Mutex

hzizmtfuyizxxugkf

Attributes
  • delay

    40

  • install

    true

  • install_file

    cclaner.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      996-55-0x0000000000380000-0x0000000000392000-memory.dmp

    • Size

      72KB

    • MD5

      c0741c5f09e005636c81946e1c821474

    • SHA1

      c81bd945e8870bb33e38182289bd9294c3c8ba7f

    • SHA256

      b9bdfaa517d5e41d4d2916336229fc6b273d81d800c5faa70c5aadb2b50c8fb8

    • SHA512

      9abf032b19264800ee51450dd49d1c86764371d4020cad75356149c54ef596b52f877097be1ab9c3e195fba2d52fda255d7286ef857904a65b47f6b4b4732c5c

    • SSDEEP

      768:QoDRMt9b8i9K4GR2VNuIx2FAhQ7CbEjbegr3iaxgvUroz0ClZN2tYcFmVc6K:QoDRMth9U2hfEbhrSjUroz5rNKmVcl

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks