General

  • Target

    TRANSACCION DE PAGO A CUENTA BANCARIA PDF (1).rar

  • Size

    307KB

  • Sample

    221201-w4cs6abe4y

  • MD5

    c30f03dd5ad820d91e26d9ff8eba81dd

  • SHA1

    78a5c81e1736607df7359656009d03c2fd0cb4b6

  • SHA256

    1e3e424d41bae88878ec8ff68e76e437012fdabd8881937dbe9300527c7d0e66

  • SHA512

    8048288f958df9d65b01bcf04af405ad4e096f27b8c06724db18670683f71fa17b4392ef566843fd2bce4140824dd0e348aacf7ea4a28f1a4a1f6907a74f40af

  • SSDEEP

    6144:YKnpK0t0i9sTs3uWGudfdh9DtWJK9Ypy+b+1Epk4Scv9:YKpKi0ts3Ku1Z0eBsCcF

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

bmxfghsh.duckdns.org:8026

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      TRANSACCION DE PAGO A CUENTA BANCARIA PDF.exe

    • Size

      310KB

    • MD5

      21e46a899b0322c89c9be7a523c8fac0

    • SHA1

      ee646c0fee2f4e859776b859f7723293da978825

    • SHA256

      32232cd07f6c7553613725de84b0fb6da14d2a076918c59e5d1bdf704b857d12

    • SHA512

      0963e30a46064f25ef24a0f37f5f5503a8a36c893678002ef3821965755032a8c47654bf07d89e2bf418bf86b9e61bf5c73cf76c63e2307fa414b7ddb0532f09

    • SSDEEP

      6144:+Pla3hyO2k1EwO4jDFcPQQAF+MdsjdBMamnL2c3ra9pWQ3R2wialFpra:0syOlFc4QAfsBtmL2PDWOtlH

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks