General

  • Target

    bc89b166b9a6cb7d1e9d69b369e4e1ad25c5d255720b6d8f7c77a93d3a1f58ff

  • Size

    1.3MB

  • Sample

    230508-3pesjadd36

  • MD5

    574a2c45fd577e5659dd60ea601361cd

  • SHA1

    80c78e2c5a8a6039c4efe2dd16d27f7dfde2cc62

  • SHA256

    bc89b166b9a6cb7d1e9d69b369e4e1ad25c5d255720b6d8f7c77a93d3a1f58ff

  • SHA512

    b88de02aa4ae70d85c6be71a90770015f5949f6df5468d7e3de9243127dc1bbb235843d6b4f763ba66254f7e66e56cb71824f00050e1c979ac6bd6a90f283faa

  • SSDEEP

    24576:uVngJMCOZod0VP+jfxJborXgzeoR5NhhLqNfUlqz:uOd0V2jzmkJPhWOw

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

isabelaflores.fun:7000

Mutex

ServicesMutex_qwqdanchun

Attributes
  • delay

    240

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      bc89b166b9a6cb7d1e9d69b369e4e1ad25c5d255720b6d8f7c77a93d3a1f58ff

    • Size

      1.3MB

    • MD5

      574a2c45fd577e5659dd60ea601361cd

    • SHA1

      80c78e2c5a8a6039c4efe2dd16d27f7dfde2cc62

    • SHA256

      bc89b166b9a6cb7d1e9d69b369e4e1ad25c5d255720b6d8f7c77a93d3a1f58ff

    • SHA512

      b88de02aa4ae70d85c6be71a90770015f5949f6df5468d7e3de9243127dc1bbb235843d6b4f763ba66254f7e66e56cb71824f00050e1c979ac6bd6a90f283faa

    • SSDEEP

      24576:uVngJMCOZod0VP+jfxJborXgzeoR5NhhLqNfUlqz:uOd0V2jzmkJPhWOw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • UAC bypass

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks