General

  • Target

    Pago.pif.exe

  • Size

    623KB

  • Sample

    230330-qqnevacg94

  • MD5

    652dd5b56989f5ef5cb33759bf1ccbd0

  • SHA1

    c7ba417514e93c71af7298ab9ba0c004079961b7

  • SHA256

    50780178c6e35fc1107aa6aacb09c6d1a46d2200f909a95836c88cb7c3651c0e

  • SHA512

    985d14a3159a6cab09a6cbb3048a306ea905a2311dcc93a1dba43796690aae647e91939fbfb9a47c0584eba7f16ebab2c9bc54c3e597d8d9b3d5c1f2d9946d6d

  • SSDEEP

    12288:NcrNS33L10QdrXjcDn/ecGKnIiAnoXxDR3KUKLpFQBr7JFWpzL:wNA3R5drXoD/pfAnoXpR7kpFQBvJyL

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Mnock

C2

mooroopecamroy.sytes.net:1452

mooroopecamroy.sytes.net:1432

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    crssi.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Pago.pif.exe

    • Size

      623KB

    • MD5

      652dd5b56989f5ef5cb33759bf1ccbd0

    • SHA1

      c7ba417514e93c71af7298ab9ba0c004079961b7

    • SHA256

      50780178c6e35fc1107aa6aacb09c6d1a46d2200f909a95836c88cb7c3651c0e

    • SHA512

      985d14a3159a6cab09a6cbb3048a306ea905a2311dcc93a1dba43796690aae647e91939fbfb9a47c0584eba7f16ebab2c9bc54c3e597d8d9b3d5c1f2d9946d6d

    • SSDEEP

      12288:NcrNS33L10QdrXjcDn/ecGKnIiAnoXxDR3KUKLpFQBr7JFWpzL:wNA3R5drXoD/pfAnoXpR7kpFQBvJyL

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks