General

  • Target

    6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337

  • Size

    528KB

  • Sample

    231124-hw5bjsgd82

  • MD5

    5a5b47e8be61b21d221325e7d52ceaa0

  • SHA1

    30c2a30a9d642da80d65279d4bbe458b8aac6c42

  • SHA256

    6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337

  • SHA512

    af70b7d2bec8c1c80e5962974b72a99c6bb944734123a3947b6fedc799987c88778df98cec419879a89e1f7bec3fdc5b91806b6aab2e5289e35d4c97a8daa23c

  • SSDEEP

    12288:wjQnmCnJfKxhAfaeWvbVPtEeUA6AIYsOTzX805:wUnBnYxef7WvplEI6800

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

MicrosoftEdg

C2

46.1.103.69:9371

Mutex

MicrosoftEdg

Attributes
  • delay

    3

  • install

    false

  • install_file

    MicrosoftEdge

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

MicrosoftEdge

C2

46.1.103.69:9371

Mutex

MicrosoftEdge

Attributes
  • delay

    3

  • install

    false

  • install_file

    MicrosoftEdge

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Winlogon

C2

46.1.103.69:2341

Mutex

Winlogon

Attributes
  • delay

    3

  • install

    false

  • install_file

    Winlogon

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337

    • Size

      528KB

    • MD5

      5a5b47e8be61b21d221325e7d52ceaa0

    • SHA1

      30c2a30a9d642da80d65279d4bbe458b8aac6c42

    • SHA256

      6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337

    • SHA512

      af70b7d2bec8c1c80e5962974b72a99c6bb944734123a3947b6fedc799987c88778df98cec419879a89e1f7bec3fdc5b91806b6aab2e5289e35d4c97a8daa23c

    • SSDEEP

      12288:wjQnmCnJfKxhAfaeWvbVPtEeUA6AIYsOTzX805:wUnBnYxef7WvplEI6800

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks