General

  • Target

    AS000456879.exe

  • Size

    461KB

  • Sample

    230322-hqnfvahc6v

  • MD5

    4101ca6880258f103df2c744efda4cde

  • SHA1

    90aed0f7474acd6321af277d6f9f81cf0674405d

  • SHA256

    d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf

  • SHA512

    0668bf6b23e2fde4e6f5db97cf36a05c4819c5f12744f86e6cb0f799a0fad4ceaff43d0f15fe0b3bb417fa5143ce4b25c2b71a20d1102964606ae9182a77d049

  • SSDEEP

    3072:IfY/TU9fE9PEtuoRbtv9BAthLEMw5m4i9zgngzRtunMK1L4PQw/ihbceYSgOt:+Ya64D1Mw5mZgnqiEPv/somt

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

172.245.251.219:2015

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AS000456879.exe

    • Size

      461KB

    • MD5

      4101ca6880258f103df2c744efda4cde

    • SHA1

      90aed0f7474acd6321af277d6f9f81cf0674405d

    • SHA256

      d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf

    • SHA512

      0668bf6b23e2fde4e6f5db97cf36a05c4819c5f12744f86e6cb0f799a0fad4ceaff43d0f15fe0b3bb417fa5143ce4b25c2b71a20d1102964606ae9182a77d049

    • SSDEEP

      3072:IfY/TU9fE9PEtuoRbtv9BAthLEMw5m4i9zgngzRtunMK1L4PQw/ihbceYSgOt:+Ya64D1Mw5mZgnqiEPv/somt

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks