General

  • Target

    7e2b561323379eb18ff180c88b7381edaaaf8b6047111a1b3e2a325dcebd123a

  • Size

    5KB

  • Sample

    221217-h8eawsgc76

  • MD5

    9f785803874e569c4309fb73dc109d37

  • SHA1

    6942a4e79d651d6ff8fe9e4fafa6dc48fc5c9ced

  • SHA256

    7e2b561323379eb18ff180c88b7381edaaaf8b6047111a1b3e2a325dcebd123a

  • SHA512

    b69e1189d80f39e29932e8ee07d5ecc37056a04cfb0549c2d61e8dbf1fbb32040412c0da0598ea4095700365aac3d201abaf5aa3c24c3c6d282389863ece00ec

  • SSDEEP

    96:iC79tll3VI2vK8eu2tT+vk+zpCI80vK+/0s7DgGKed3ojgrl:iU9t/33v038vkM4I80vK+/0SAed/

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

System Guard Runtime

C2

85.105.88.221:2531

Mutex

System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    System Guard Runtime

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      7e2b561323379eb18ff180c88b7381edaaaf8b6047111a1b3e2a325dcebd123a

    • Size

      5KB

    • MD5

      9f785803874e569c4309fb73dc109d37

    • SHA1

      6942a4e79d651d6ff8fe9e4fafa6dc48fc5c9ced

    • SHA256

      7e2b561323379eb18ff180c88b7381edaaaf8b6047111a1b3e2a325dcebd123a

    • SHA512

      b69e1189d80f39e29932e8ee07d5ecc37056a04cfb0549c2d61e8dbf1fbb32040412c0da0598ea4095700365aac3d201abaf5aa3c24c3c6d282389863ece00ec

    • SSDEEP

      96:iC79tll3VI2vK8eu2tT+vk+zpCI80vK+/0s7DgGKed3ojgrl:iU9t/33v038vkM4I80vK+/0SAed/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks