General

  • Target

    Client.exe

  • Size

    152KB

  • Sample

    240124-qhdwfabbcj

  • MD5

    4eca25e5d48e5a2545d3338b1917cb63

  • SHA1

    a1bf9a31f79d361cd4868bdc416093d3c4e1c395

  • SHA256

    734b51174ef82cd21c44faeca68824b3aa688d3173d7e55e61895efb3119d58f

  • SHA512

    7f4e5d8e54c9137d4f4c8074fa89488891f1cd5049be42a0f4ae3edd9eb653c68e29a15f3ebd03aaca531978b5697eb3a1bb8fde460d98a874eac2b9332620b2

  • SSDEEP

    3072:Lt58/dhceTZZw53OK8fSCJTXDErgzEsGbURCSijVyWb1JGYQ:4d68ZwoLfNJTXDEWGbUsjJbp

Malware Config

Targets

    • Target

      Client.exe

    • Size

      152KB

    • MD5

      4eca25e5d48e5a2545d3338b1917cb63

    • SHA1

      a1bf9a31f79d361cd4868bdc416093d3c4e1c395

    • SHA256

      734b51174ef82cd21c44faeca68824b3aa688d3173d7e55e61895efb3119d58f

    • SHA512

      7f4e5d8e54c9137d4f4c8074fa89488891f1cd5049be42a0f4ae3edd9eb653c68e29a15f3ebd03aaca531978b5697eb3a1bb8fde460d98a874eac2b9332620b2

    • SSDEEP

      3072:Lt58/dhceTZZw53OK8fSCJTXDErgzEsGbURCSijVyWb1JGYQ:4d68ZwoLfNJTXDEWGbUsjJbp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Modifies WinLogon for persistence

    • Async RAT payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks