Resubmissions

06-01-2023 00:39

230106-aztefsdg69 10

06-01-2023 00:31

230106-at5kjadg59 10

General

  • Target

    SOA.exe

  • Size

    1.1MB

  • Sample

    230106-aztefsdg69

  • MD5

    f890903c9b2fa054a4b22b4240870db2

  • SHA1

    06ed4e7131287fcf01e49834180567daf9a13240

  • SHA256

    a0c77b9f372d94ae8cbc32b27d319491cb65001b12963bc68b96b8caaf10dfa0

  • SHA512

    b230749492b8d3ceb0824badc423c163c706df0c464849950523f2bedefa2ed7f50de83ee403611f1c5559f154f0fed7335310d23233701625de65bc09b9e883

  • SSDEEP

    12288:xJEPCBEYJmzdicP0bYzJfKMVvS1yIuDBXolPu3fgzHIGEoTCqEUbeSh39W+ll8nO:rCJRVXbe8REgRJrn85cMNd

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

ESCANOR2022.LINKPC.NET:6606

ESCANOR2022.LINKPC.NET:7707

ESCANOR2022.LINKPC.NET:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    sqli.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      SOA.exe

    • Size

      1.1MB

    • MD5

      f890903c9b2fa054a4b22b4240870db2

    • SHA1

      06ed4e7131287fcf01e49834180567daf9a13240

    • SHA256

      a0c77b9f372d94ae8cbc32b27d319491cb65001b12963bc68b96b8caaf10dfa0

    • SHA512

      b230749492b8d3ceb0824badc423c163c706df0c464849950523f2bedefa2ed7f50de83ee403611f1c5559f154f0fed7335310d23233701625de65bc09b9e883

    • SSDEEP

      12288:xJEPCBEYJmzdicP0bYzJfKMVvS1yIuDBXolPu3fgzHIGEoTCqEUbeSh39W+ll8nO:rCJRVXbe8REgRJrn85cMNd

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • UAC bypass

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

5
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks