General

  • Target

    3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2

  • Size

    417KB

  • Sample

    230129-1b3akadd88

  • MD5

    eba584dbe102dea11a92683e90bc5306

  • SHA1

    3ec661ea74194a24a1468ea932c0f658bdf1080c

  • SHA256

    3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2

  • SHA512

    6d1f7874809b1416be371be2dbeefa79e0ecbaf782a2800c4a6b6537ef408d3f1c6d13842937dd055e5941d31d3884348d69d0d25a545e43bcd67e6ecadea4e1

  • SSDEEP

    12288:NomltV+kni0u8wHEnjQHyUjCa9q9Zsdk:pKFHXj/9q9KS

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

0.tcp.ngrok.io:6032

Mutex

Asyn♦cMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2

    • Size

      417KB

    • MD5

      eba584dbe102dea11a92683e90bc5306

    • SHA1

      3ec661ea74194a24a1468ea932c0f658bdf1080c

    • SHA256

      3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2

    • SHA512

      6d1f7874809b1416be371be2dbeefa79e0ecbaf782a2800c4a6b6537ef408d3f1c6d13842937dd055e5941d31d3884348d69d0d25a545e43bcd67e6ecadea4e1

    • SSDEEP

      12288:NomltV+kni0u8wHEnjQHyUjCa9q9Zsdk:pKFHXj/9q9KS

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks