General

  • Target

    45ba43813271c0c4d377338c381992cd5b0220b80c00cffc0b284f84cc0aee66

  • Size

    426KB

  • Sample

    221130-s8qzssdd53

  • MD5

    a504f9dfe6a3554120c7902c56ddf3b2

  • SHA1

    a89ca17e9c1af4912a55bdf49bc0020a3990b408

  • SHA256

    45ba43813271c0c4d377338c381992cd5b0220b80c00cffc0b284f84cc0aee66

  • SHA512

    7557a1bb0edde11ff8d4c68e9c3e11cde7c677e284afcdbd2359dcc9a88692299aa035098663c995948d07518711ac812f7f689a2a559d30da8afed7ce31a08c

  • SSDEEP

    12288:URifysycqld21fNlRU3LmWTvnGeUITYBK7ENId0fGwVTMsMt:UoypcVFWDGXIEcIAILtT

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

primo1.hopto.org:7771

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    15

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      45ba43813271c0c4d377338c381992cd5b0220b80c00cffc0b284f84cc0aee66

    • Size

      426KB

    • MD5

      a504f9dfe6a3554120c7902c56ddf3b2

    • SHA1

      a89ca17e9c1af4912a55bdf49bc0020a3990b408

    • SHA256

      45ba43813271c0c4d377338c381992cd5b0220b80c00cffc0b284f84cc0aee66

    • SHA512

      7557a1bb0edde11ff8d4c68e9c3e11cde7c677e284afcdbd2359dcc9a88692299aa035098663c995948d07518711ac812f7f689a2a559d30da8afed7ce31a08c

    • SSDEEP

      12288:URifysycqld21fNlRU3LmWTvnGeUITYBK7ENId0fGwVTMsMt:UoypcVFWDGXIEcIAILtT

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks