General

  • Target

    e91d02519dfb511754d45bd0ea6761ab41b0c96336ceb5b7ebf4d946e576bed8

  • Size

    860KB

  • Sample

    221130-snzffaeb8t

  • MD5

    1c4b81dc51aba18efdb7ca0018e57ee9

  • SHA1

    928e62adc64e8c72b16f9f62a18447df87d5a8cb

  • SHA256

    e91d02519dfb511754d45bd0ea6761ab41b0c96336ceb5b7ebf4d946e576bed8

  • SHA512

    6865583489f879a90d642be21460bcd359d29ebfbf1654d0fe740b2443c625f59ab057b15b005c09c57ae0a739b6f98c8782fbf0daa46df0192195ce3cfd998d

  • SSDEEP

    768:WHuiL/OGH4e//KTGr/EwlqhrQcZdOjFV5gVwkz0EuHel9LEEXk+B4aqg1eXkDu1J:EzzZO1nMkQdkxBaLIhnyvzB

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

hgjvhnfgg.duckdns.org:8057

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      e91d02519dfb511754d45bd0ea6761ab41b0c96336ceb5b7ebf4d946e576bed8

    • Size

      860KB

    • MD5

      1c4b81dc51aba18efdb7ca0018e57ee9

    • SHA1

      928e62adc64e8c72b16f9f62a18447df87d5a8cb

    • SHA256

      e91d02519dfb511754d45bd0ea6761ab41b0c96336ceb5b7ebf4d946e576bed8

    • SHA512

      6865583489f879a90d642be21460bcd359d29ebfbf1654d0fe740b2443c625f59ab057b15b005c09c57ae0a739b6f98c8782fbf0daa46df0192195ce3cfd998d

    • SSDEEP

      768:WHuiL/OGH4e//KTGr/EwlqhrQcZdOjFV5gVwkz0EuHel9LEEXk+B4aqg1eXkDu1J:EzzZO1nMkQdkxBaLIhnyvzB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

4
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks