General

  • Target

    3cb8519b3d33b567e68289dd057629c12388ca19ee2cd0bfd2dcbefe8728402d.zip

  • Size

    61KB

  • Sample

    230321-rvqlfada6z

  • MD5

    ddbe9a538544e22d257eca47e07b3774

  • SHA1

    3ff5f02bb89ecabcf9c765f61b10cae95c25961f

  • SHA256

    d3184c9b86460714706d3d522c89e5b53d74a386953d3dd9a59c4b7c6a9e10fc

  • SHA512

    289777de592ee3e097da08a112b4598f2b85724b9b861beb651e6ed7691fa8f219733dee593eb408267e5546d35a78208b1ccc6abf4adf6a3f4485706c40f6d4

  • SSDEEP

    1536:spH7snsJ2JBMsgR7Gxgep58+MYRGov96dbCo:sFmiR6x3p5+bolsbCo

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

xxxprofxxx.dnsdojo.com:5126

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3cb8519b3d33b567e68289dd057629c12388ca19ee2cd0bfd2dcbefe8728402d.ps1

    • Size

      226KB

    • MD5

      ca7205724f31290cdef29a7e0f0743d0

    • SHA1

      e7dbb3b8bd7a31698f97a21b25cd03e67f8be91f

    • SHA256

      3cb8519b3d33b567e68289dd057629c12388ca19ee2cd0bfd2dcbefe8728402d

    • SHA512

      661e18b9d63c8ff1849f7b6ba81b5d44a68fc3e605c207d965a7e4841e244a114881a6f0ca77e1ad18fbef2d881327ea460333e27741521107bf2314e7b65c98

    • SSDEEP

      1536:vNUP7fvRYjFYFWPApqqPDXdkSajySbVeJ+ARXqX3XXSX3XHCyyvL93yVxgQ51kIN:G+/mjLnfhUd3tNTrrD4Qzxu

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks