General

  • Target

    621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67.zip

  • Size

    1KB

  • Sample

    230321-rvqlfaah89

  • MD5

    395fe6a77d407033a4fa4b2a2db04bcb

  • SHA1

    5d83226068de6f9a1975cd8e0207dbc8a7225701

  • SHA256

    5118a2474186a2b702e3daa0315501eb400aa40594a7444133abe9edee6f94e1

  • SHA512

    c735c3d346ad6b67850c58b0fab7a47cda7c7b84e09a15f05afb796be063ee77466a57cf88ae3925e8c1fd7c108ab47d821df7231f565efea9f8c74a3fe89e0c

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

New Grapity

C2

services.work.gd:555

Mutex

AsyncMutex

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67.js

    • Size

      37KB

    • MD5

      69217e37a891c3aa3c9ccb9d115ef51d

    • SHA1

      9d16ee0f7e6af6fc2f6bf5b1a4871d7f74eefac5

    • SHA256

      621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67

    • SHA512

      ce539eff77c75075202ec16ae952b27edc51fbb3b37f152c6b15552b207ac0f7b0db28eed2f038e5b8791b25d2151316d9aca8a6e496b5b780a169f93fd8e360

    • SSDEEP

      384:XIIIIIIIIIIIeIIIIIIIIIII2GIIIIIIIIIIIlIIIIIIIIIII6eYIIIIIIIIIIIj:pTi+i

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Registers COM server for autorun

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks