General

  • Target

    61F0D8F4844EB358096D86CF0DDA1D02E6056F5DDA28E.exe

  • Size

    127KB

  • Sample

    230109-xvxyeaag61

  • MD5

    91ba33af6f1da1ed631c317f05fdb761

  • SHA1

    2afc5062cd568175f22cb37cf5876d5e982aa4d3

  • SHA256

    61f0d8f4844eb358096d86cf0dda1d02e6056f5dda28e14851e4d5f84ef429e6

  • SHA512

    47a790c8eef2e9297b0b6ee2fc77059a426f7cd3f0c29259d137548882ae54c36c0dc6c943aee1ef91cb76faa844daf54ce76e778cafc97600d40c19f6a55a81

  • SSDEEP

    3072:wr85C8sXmbgR+fPUSphJ7Ll+ugewHgCSCl:w9gbj0ufwA3i

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

System Guard Runtime

C2

85.105.88.221:2531

Mutex

System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    System Guard Runtime

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      61F0D8F4844EB358096D86CF0DDA1D02E6056F5DDA28E.exe

    • Size

      127KB

    • MD5

      91ba33af6f1da1ed631c317f05fdb761

    • SHA1

      2afc5062cd568175f22cb37cf5876d5e982aa4d3

    • SHA256

      61f0d8f4844eb358096d86cf0dda1d02e6056f5dda28e14851e4d5f84ef429e6

    • SHA512

      47a790c8eef2e9297b0b6ee2fc77059a426f7cd3f0c29259d137548882ae54c36c0dc6c943aee1ef91cb76faa844daf54ce76e778cafc97600d40c19f6a55a81

    • SSDEEP

      3072:wr85C8sXmbgR+fPUSphJ7Ll+ugewHgCSCl:w9gbj0ufwA3i

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks