General

  • Target

    badL-main.zip

  • Size

    39KB

  • Sample

    221207-hd4bjafh2s

  • MD5

    d679e369e4f1dd131014769e4d6af4ae

  • SHA1

    91aa1a75cbb4005cf833240d2add73f0bc4ea3bc

  • SHA256

    a43f821843ae4f5645e262dfdeaa574cb04909ecc59058bf563c051c9be54cca

  • SHA512

    f4d1d2f3cf4264ac56528b42a046c68a0764cd512680a1336ded8557f2ff6a5fa9f6a11275f33a4da6491cdea63a0d9bdcb8feb89a2d99ca20cc9acb3ec01da7

  • SSDEEP

    768:adWvzK95keRqvNeHKrPLZ84pizztHqy2DSUDij8Qd3PkSdbtmXg+G:ukzK95keRAkHOFdiXb29grtLOG

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

+ Stealer 5.0.7

Botnet

Stac

C2

127.0.0.1:4449

127.0.0.1:56721

111.90.147.102:4449

111.90.147.102:56721

Mutex

ASfgsahfWDS

Attributes
  • delay

    1

  • install

    true

  • install_file

    lib32.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      wininfo32/lib64.exe

    • Size

      81KB

    • MD5

      8fa2f4a2594f41b3a6fa4f50bbe9b0a8

    • SHA1

      17bb7325da58af388316d19fbd054fcb1e1146dd

    • SHA256

      c0bd5fcd7a91eb868dddb6172f5e576b5efa1a4c57a7f5cade8f4cef236fb001

    • SHA512

      2dbc09e9669d9418a54b406027aeebd66a8b9f5d80d9efec3e32e268429f87a9ae1a44ab4d0c321b28593e7bfbe820c0de4f7fd8a6f385bc9b3cb6d0727f862a

    • SSDEEP

      1536:anLHHTYQgq2Rt0CbbCfa5YkgMdVclNa7G/7GaF:anLHHTYQNSt0CbbCSKOvYAy/y4

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks