General

  • Target

    97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3

  • Size

    878KB

  • Sample

    221130-tvcexsaa6s

  • MD5

    72d1a18668b9c354bec0c1f4bb282503

  • SHA1

    940cb647752ed13c34ea021f7617312960a61e35

  • SHA256

    97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3

  • SHA512

    91f1dfccb4b12ac2a46876da7422ec20865fd00c91ca06a2288cfe85787794b3b81bdd6bfc0f6a78ef70dfe1e2cf8112c94efc4f7b78d4318f99762d3f6a49a1

  • SSDEEP

    768:UfQf38+WbFafW237K6DpM38IDq+R6qc1CUMXfptSX5ItFaOT8MOrhI:Ub8MOy

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

asdfdsg.duckdns.org:8050

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3

    • Size

      878KB

    • MD5

      72d1a18668b9c354bec0c1f4bb282503

    • SHA1

      940cb647752ed13c34ea021f7617312960a61e35

    • SHA256

      97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3

    • SHA512

      91f1dfccb4b12ac2a46876da7422ec20865fd00c91ca06a2288cfe85787794b3b81bdd6bfc0f6a78ef70dfe1e2cf8112c94efc4f7b78d4318f99762d3f6a49a1

    • SSDEEP

      768:UfQf38+WbFafW237K6DpM38IDq+R6qc1CUMXfptSX5ItFaOT8MOrhI:Ub8MOy

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

4
T1089

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks