General

  • Target

    6c701b09803ad18e93024d320c6a324d.exe

  • Size

    29KB

  • Sample

    230208-xs88nadh7t

  • MD5

    6c701b09803ad18e93024d320c6a324d

  • SHA1

    da096644b61ab6c6dc5544733794773a141c4b17

  • SHA256

    eb205a5851de3d6f7fbce5129dea8443bffcac19ae1436e88e8e0ea4bc5d1585

  • SHA512

    95dd75fd729aa684e14fa1e5568bb2ab3d3f730f0f0b34215ceb5a2f847dd202373358877450940ced7a074856fcfcb1242120d70b1cf38cd5082c2a94ce175c

  • SSDEEP

    768:N2vFNP/2hkbIz0RhijkXSiegJAY93sP7nwXr:eFN3YTiegS03sDw7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

?><MKdfdsgdgregrtgrthh<LKOIJUY&^T%RFDEXcfgvhbnjuimowefinuybt

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/VM7TRmVa

aes.plain

Targets

    • Target

      6c701b09803ad18e93024d320c6a324d.exe

    • Size

      29KB

    • MD5

      6c701b09803ad18e93024d320c6a324d

    • SHA1

      da096644b61ab6c6dc5544733794773a141c4b17

    • SHA256

      eb205a5851de3d6f7fbce5129dea8443bffcac19ae1436e88e8e0ea4bc5d1585

    • SHA512

      95dd75fd729aa684e14fa1e5568bb2ab3d3f730f0f0b34215ceb5a2f847dd202373358877450940ced7a074856fcfcb1242120d70b1cf38cd5082c2a94ce175c

    • SSDEEP

      768:N2vFNP/2hkbIz0RhijkXSiegJAY93sP7nwXr:eFN3YTiegS03sDw7

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks