General

  • Target

    180a79cff5ef91ecd744a35b2e433d0a4aae0e4d3b87c40e8e51f5ca02aac4d6.lnk

  • Size

    3KB

  • Sample

    230328-vsy2kscb73

  • MD5

    3b806fe4f970a98064a83d04a8921b7f

  • SHA1

    57c975d687878b6c0f86629a4ae908f5d7e25e13

  • SHA256

    180a79cff5ef91ecd744a35b2e433d0a4aae0e4d3b87c40e8e51f5ca02aac4d6

  • SHA512

    9947eac784e2cd364640a63d7ad648465f3b389d3485bc20db7078396497f1a025fafb34110439de9d35425e66fc32a7ed81c50e6a38c32a473f026afd431422

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

nulled2nd.camdvr.org:6666

Mutex

AsyncMutex_null

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      180a79cff5ef91ecd744a35b2e433d0a4aae0e4d3b87c40e8e51f5ca02aac4d6.lnk

    • Size

      3KB

    • MD5

      3b806fe4f970a98064a83d04a8921b7f

    • SHA1

      57c975d687878b6c0f86629a4ae908f5d7e25e13

    • SHA256

      180a79cff5ef91ecd744a35b2e433d0a4aae0e4d3b87c40e8e51f5ca02aac4d6

    • SHA512

      9947eac784e2cd364640a63d7ad648465f3b389d3485bc20db7078396497f1a025fafb34110439de9d35425e66fc32a7ed81c50e6a38c32a473f026afd431422

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks