General

  • Target

    Document #33088.DOCX .js

  • Size

    69KB

  • Sample

    230227-xvje1sfc74

  • MD5

    0189258a89300482417c7727e57d14a6

  • SHA1

    5162b7c1ce9b646632eac2d0fe99b7f8f8369263

  • SHA256

    b3051daf1bb20dfa1cbc49a1da48ad341ed3a3ccb86fa8ba5a264c4e98cdc0e0

  • SHA512

    65349f732e26312b2c06b3559272bfff70f392e7675ccb77b321f579d73439e7fe69f69d9b664e9b97e87e61321ab9ad377b4f503a412eff5d4ce4c614766b49

  • SSDEEP

    1536:xlHFMJ1aan+zqOqb/UQ6USfhartMIbIqsvN65zKpmJWabLWgHxHvMW4B+BGmS5Cp:PFMJ1aan+zqOqb/UQ6USfhartMIbIqsI

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://176.113.115.123/o.html

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.123/o.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.123/a.png

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

176.113.115.123:6606

176.113.115.123:7707

176.113.115.123:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Document #33088.DOCX .js

    • Size

      69KB

    • MD5

      0189258a89300482417c7727e57d14a6

    • SHA1

      5162b7c1ce9b646632eac2d0fe99b7f8f8369263

    • SHA256

      b3051daf1bb20dfa1cbc49a1da48ad341ed3a3ccb86fa8ba5a264c4e98cdc0e0

    • SHA512

      65349f732e26312b2c06b3559272bfff70f392e7675ccb77b321f579d73439e7fe69f69d9b664e9b97e87e61321ab9ad377b4f503a412eff5d4ce4c614766b49

    • SSDEEP

      1536:xlHFMJ1aan+zqOqb/UQ6USfhartMIbIqsvN65zKpmJWabLWgHxHvMW4B+BGmS5Cp:PFMJ1aan+zqOqb/UQ6USfhartMIbIqsI

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks