General

  • Target

    hyphon_loader.exe

  • Size

    2.9MB

  • Sample

    230402-xle18sbc41

  • MD5

    f507171192dd73378849dfb8250162cd

  • SHA1

    9a7c58e5ed76de2d73d64ae872da6517ccc9d88f

  • SHA256

    7b3e39a2100d7cc1ce61b8fa8c22f384a920aafd129747c56ca0fcb719122020

  • SHA512

    c1a5a3ef7bbbab501ddae561cfd0485d491e5955e75027d3087fc2a10b2c8bbdfe7c37474c20bf10957ea0ed0c6d80d1c11c5ea5bde3e04e66da9638fa1ddd00

  • SSDEEP

    49152:/Y2zrFhW97EqIm3JV38UlVUpIekMqhKy2F/wZbFTLhzpbEt2Gs3OAvUwn7lV5te6:/zy9Qqf3JVsUlVUFlybfhzi20AB59Cw

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Legacy

C2

legacyud.duckdns.org:55108

legacyud.duckdns.org:57913

Mutex

4278904ry7saigfhjaksfgfshajkgfshkajfghkjsfghsksfahlgjlhgjfasdGLHSAFLGHJSAHJGEF7024TY4297T6497425642725244256742567567246724567245672436572436579ESFHJIFVGIUAFSGISAYGAFSGYUIAFSGYUAFSGYIUAFSGYUAFSGYSAFYGYUFAIYGAFSYGUIFASYGIFASGY216934624684768246782467824678924

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      hyphon_loader.exe

    • Size

      2.9MB

    • MD5

      f507171192dd73378849dfb8250162cd

    • SHA1

      9a7c58e5ed76de2d73d64ae872da6517ccc9d88f

    • SHA256

      7b3e39a2100d7cc1ce61b8fa8c22f384a920aafd129747c56ca0fcb719122020

    • SHA512

      c1a5a3ef7bbbab501ddae561cfd0485d491e5955e75027d3087fc2a10b2c8bbdfe7c37474c20bf10957ea0ed0c6d80d1c11c5ea5bde3e04e66da9638fa1ddd00

    • SSDEEP

      49152:/Y2zrFhW97EqIm3JV38UlVUpIekMqhKy2F/wZbFTLhzpbEt2Gs3OAvUwn7lV5te6:/zy9Qqf3JVsUlVUFlybfhzi20AB59Cw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks