General

  • Target

    ngrclub-protected.exe

  • Size

    3.0MB

  • Sample

    240124-xjwk7sgaap

  • MD5

    209ce82914f67632c011132bc09a1584

  • SHA1

    eb565f108a63b3f78ea3cefbaec1d845663c671f

  • SHA256

    d3a452c7dd9039acac94b60bec2c90d3bb656756ae7e18a50b328d6fe22e80cf

  • SHA512

    fa47be79234d6805ce37a37cfe1bbf2792dba42ed60914d7b8fc9905bd59b0e483bbadf0a8abcffab07885eb6ea5dfa4d2271fb24fc8099d268b0549f701be87

  • SSDEEP

    49152:LdWnZHdTB1mIkDa1lS5x4hxQJxG9d213ChYfKMjObIOZc/HyVSUwTPGlOVZNB2zg:LdWZHZB1UenSooxGf2CGfKYOvm/SVcjX

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Versace.WTF

C2

45.128.36.146:8848

Mutex

fhfsf69fga86gf78525845rt2867752456877777777777777777777

Attributes
  • delay

    1

  • install

    true

  • install_file

    msedge.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      ngrclub-protected.exe

    • Size

      3.0MB

    • MD5

      209ce82914f67632c011132bc09a1584

    • SHA1

      eb565f108a63b3f78ea3cefbaec1d845663c671f

    • SHA256

      d3a452c7dd9039acac94b60bec2c90d3bb656756ae7e18a50b328d6fe22e80cf

    • SHA512

      fa47be79234d6805ce37a37cfe1bbf2792dba42ed60914d7b8fc9905bd59b0e483bbadf0a8abcffab07885eb6ea5dfa4d2271fb24fc8099d268b0549f701be87

    • SSDEEP

      49152:LdWnZHdTB1mIkDa1lS5x4hxQJxG9d213ChYfKMjObIOZc/HyVSUwTPGlOVZNB2zg:LdWZHZB1UenSooxGf2CGfKYOvm/SVcjX

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks