General

  • Target

    b86dddd56825d0aada8294f4667d72b5019b99435db7f2706150e1288ece6f9f

  • Size

    413KB

  • Sample

    230129-1bc1nsdd72

  • MD5

    7e09977213008f9aedf2d632e12d6e07

  • SHA1

    7faec1e3a1d3dee4e6d94177a2f9ddad14995230

  • SHA256

    b86dddd56825d0aada8294f4667d72b5019b99435db7f2706150e1288ece6f9f

  • SHA512

    0149d3c5c42086d965288c6e1ef064f2b5bc1a904088586a48c70f4c696d73736e5293522b0039e1a5228437f04f87dd729b4f6ce6c5502bcdb17cdfdf84a903

  • SSDEEP

    6144:6iHmCccfg4FZA+wELY2dq1E3jH2GG+9Ji5SJ19QSAu0xlEDxVk4LZEkVF:6iJG+wwdq1I2GXFJDQZu0/SxZDF

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:81

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Choromeupdate.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      b86dddd56825d0aada8294f4667d72b5019b99435db7f2706150e1288ece6f9f

    • Size

      413KB

    • MD5

      7e09977213008f9aedf2d632e12d6e07

    • SHA1

      7faec1e3a1d3dee4e6d94177a2f9ddad14995230

    • SHA256

      b86dddd56825d0aada8294f4667d72b5019b99435db7f2706150e1288ece6f9f

    • SHA512

      0149d3c5c42086d965288c6e1ef064f2b5bc1a904088586a48c70f4c696d73736e5293522b0039e1a5228437f04f87dd729b4f6ce6c5502bcdb17cdfdf84a903

    • SSDEEP

      6144:6iHmCccfg4FZA+wELY2dq1E3jH2GG+9Ji5SJ19QSAu0xlEDxVk4LZEkVF:6iJG+wwdq1I2GXFJDQZu0/SxZDF

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks