General

  • Target

    Calc_X.exe

  • Size

    23.9MB

  • Sample

    230925-r8fy6ahc24

  • MD5

    730dcc37908a2d2309938e6690239232

  • SHA1

    13bbce6780f9ee0737212dec9d6610044e3f4e6a

  • SHA256

    6fb975c7c3fe963b44abcaf199eadc68f36dbf880901617a529b59d9cf9344ce

  • SHA512

    5c68947408d87810cd2007fea2b04696d7ccac68a173eba5a15aef0468361996e0d38b614c74ff691f3ce7cdc20841a3062409c5629539c2670d97a822180444

  • SSDEEP

    393216:mu7L/D7YC+pOXhQfuKDfDYQwMpfaMPg5R3ms6G8ovxJuDJeM8ch4OOJF:mCLnYC+kxQmKbUQwuf9Pg5tms6GgJelH

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

def

C2

37.18.62.18:8060

Mutex

era2312swe12-1213rsgdkms23

Attributes
  • delay

    1

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      Calc_X.exe

    • Size

      23.9MB

    • MD5

      730dcc37908a2d2309938e6690239232

    • SHA1

      13bbce6780f9ee0737212dec9d6610044e3f4e6a

    • SHA256

      6fb975c7c3fe963b44abcaf199eadc68f36dbf880901617a529b59d9cf9344ce

    • SHA512

      5c68947408d87810cd2007fea2b04696d7ccac68a173eba5a15aef0468361996e0d38b614c74ff691f3ce7cdc20841a3062409c5629539c2670d97a822180444

    • SSDEEP

      393216:mu7L/D7YC+pOXhQfuKDfDYQwMpfaMPg5R3ms6G8ovxJuDJeM8ch4OOJF:mCLnYC+kxQmKbUQwuf9Pg5tms6GgJelH

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks