General

  • Target

    822c659a8ad91358189573135d99d6af226b1271bcfa053a2f49a8ea193b1619

  • Size

    1.1MB

  • Sample

    221130-wb35msee2t

  • MD5

    fd0f12448b7ce4e82e014b64b2676e93

  • SHA1

    3b5891e13f7f63c25e88030ba78d3290934f8640

  • SHA256

    822c659a8ad91358189573135d99d6af226b1271bcfa053a2f49a8ea193b1619

  • SHA512

    34d01684dcc7f91439ac333e5ee86a1ce1e724ad8f71eaf3b7c215cd32b595e1b6835a7ed077c8ac3f42fe7975d103d06afae5031f446442a7b748f68a214c51

  • SSDEEP

    12288:+fcAcrc5/VtuUogBwjWxEOR3LkAb8C1atShBs/yyaVtLhqG5lg1tArWUHW9keeU8:U

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

hgjvhnfgg.duckdns.org:8057

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      822c659a8ad91358189573135d99d6af226b1271bcfa053a2f49a8ea193b1619

    • Size

      1.1MB

    • MD5

      fd0f12448b7ce4e82e014b64b2676e93

    • SHA1

      3b5891e13f7f63c25e88030ba78d3290934f8640

    • SHA256

      822c659a8ad91358189573135d99d6af226b1271bcfa053a2f49a8ea193b1619

    • SHA512

      34d01684dcc7f91439ac333e5ee86a1ce1e724ad8f71eaf3b7c215cd32b595e1b6835a7ed077c8ac3f42fe7975d103d06afae5031f446442a7b748f68a214c51

    • SSDEEP

      12288:+fcAcrc5/VtuUogBwjWxEOR3LkAb8C1atShBs/yyaVtLhqG5lg1tArWUHW9keeU8:U

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks