General

  • Target

    tria,ge.txt

  • Size

    73B

  • Sample

    230726-qeyfnscc4w

  • MD5

    3a5e408a45ab56aa5ab95467d11ecce3

  • SHA1

    72aecbbec283e86abb31f2022866b4e55aebdf59

  • SHA256

    eee52cf5c0772ee582b2ed9c3e162210eb83b8a5198cd2b5d3f6cbb9a5f56988

  • SHA512

    eb440f46db8e22869558b1782d518c760269694a262b34e60ec733400fc362c85510cbaf7ca0429b4776505696403f2bdd8c4d643e067ee7e695860f6fa12bef

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

def

C2

37.18.62.18:8060

Mutex

era2312swe12-1213rsgdkms23

Attributes
  • delay

    1

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      tria,ge.txt

    • Size

      73B

    • MD5

      3a5e408a45ab56aa5ab95467d11ecce3

    • SHA1

      72aecbbec283e86abb31f2022866b4e55aebdf59

    • SHA256

      eee52cf5c0772ee582b2ed9c3e162210eb83b8a5198cd2b5d3f6cbb9a5f56988

    • SHA512

      eb440f46db8e22869558b1782d518c760269694a262b34e60ec733400fc362c85510cbaf7ca0429b4776505696403f2bdd8c4d643e067ee7e695860f6fa12bef

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks