General

  • Target

    https://objects.githubusercontent.com/github-production-release-asset-2e65be/166504281/01235b00-9298-11ea-8006-ce52c2bf4d3a?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWNJYAX4CSVEH53A%2F20230119%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20230119T151636Z&X-Amz-Expires=300&X-Amz-Signature=663697f59a03adc2d9975a7c9c2631b46d6185a847c7001da5caa74bb5a921db&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=166504281&response-content-disposition=attachment%3B%20filename%3DCOMPILED.zip&response-content-type=application%2Foctet-stream

  • Sample

    230119-td9n4add8s

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

10.127.0.10:6606

10.127.0.10:7707

10.127.0.10:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    updater.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      https://objects.githubusercontent.com/github-production-release-asset-2e65be/166504281/01235b00-9298-11ea-8006-ce52c2bf4d3a?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWNJYAX4CSVEH53A%2F20230119%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20230119T151636Z&X-Amz-Expires=300&X-Amz-Signature=663697f59a03adc2d9975a7c9c2631b46d6185a847c7001da5caa74bb5a921db&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=166504281&response-content-disposition=attachment%3B%20filename%3DCOMPILED.zip&response-content-type=application%2Foctet-stream

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Modifies visibility of file extensions in Explorer

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Persistence

Hidden Files and Directories

1
T1158

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks