General

  • Target

    file.exe

  • Size

    336KB

  • Sample

    230601-xzx4zaga43

  • MD5

    7f5fd6228a8d8edf2c88d1b34cb8c847

  • SHA1

    408049adf245bcad778add0903c6803a4d691d3f

  • SHA256

    2869fbcf083c03c7cd55e45661f6df089fdf169b1719d5052a52e2e386bf3a6d

  • SHA512

    4ec90147cdace22b9a14d776fe28837994689553aeef682597a4e218a44ca68a0227131987ed28f6458ca6ba478f2e1f39785f99c98154a301a5affb37a755ab

  • SSDEEP

    6144:DT9zpYsT9/xBDwYQJkaLVo/DtBI6C39gMGHQuwDBOknXcMbE+:DYsZ/bxQJDVODtBtOgOuYO8Xb

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

Default

Mutex

vrmctetyuyojxzjvffl

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/WD485ntt

aes.plain

Targets

    • Target

      file.exe

    • Size

      336KB

    • MD5

      7f5fd6228a8d8edf2c88d1b34cb8c847

    • SHA1

      408049adf245bcad778add0903c6803a4d691d3f

    • SHA256

      2869fbcf083c03c7cd55e45661f6df089fdf169b1719d5052a52e2e386bf3a6d

    • SHA512

      4ec90147cdace22b9a14d776fe28837994689553aeef682597a4e218a44ca68a0227131987ed28f6458ca6ba478f2e1f39785f99c98154a301a5affb37a755ab

    • SSDEEP

      6144:DT9zpYsT9/xBDwYQJkaLVo/DtBI6C39gMGHQuwDBOknXcMbE+:DYsZ/bxQJDVODtBtOgOuYO8Xb

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • UAC bypass

    • Windows security bypass

    • Async RAT payload

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks