General

  • Target

    c735194e98e65e8eef9f8ff0e7ebb438.bin

  • Size

    2KB

  • Sample

    230116-2kb1eaae7w

  • MD5

    ec2dd90c5a6d795ba7f1e046cd04c267

  • SHA1

    9ad9e25aded87d8fdc30eb9c7ac09e141f019cff

  • SHA256

    8848269e9bd482f045caacf4775cfb7ba7c47bad73e00ac159adb03262790f73

  • SHA512

    0b5c0618442718c0878ff49e40e28335afe19c0f0a0542e599e7d1087a5b4aa09eff33436b1a2f1cbb14557a42b4e8943a32a2e703148cdce9d0128ed6f90d37

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

System Guard Runtime

C2

85.105.88.221:2531

Mutex

System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    System Guard Runtime

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      a0dd0fd9b082e1e5c66861ab460fce6d9f50b4369def04da73841e5387606837.exe

    • Size

      5KB

    • MD5

      c735194e98e65e8eef9f8ff0e7ebb438

    • SHA1

      ac5045e63d0a25902f46639fbef893e490e99ae4

    • SHA256

      a0dd0fd9b082e1e5c66861ab460fce6d9f50b4369def04da73841e5387606837

    • SHA512

      c6fb11ef987ca0bd6787ab533aaf7fd82c6c7ea06aea9d5cde27f83864f2d418d037a761fbfed68e07a9ec5928eb2f8a77506c1f44467970dd88edce4a052c0a

    • SSDEEP

      96:8G791ll3VI287thtvk+PuAYks9vk+Pf1cvHd3ojxrl:/91/33Y5vkCYlvkeCHdW

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks