General

  • Target

    8397ac0fb7fcd733f9c9909fbe360c5a

  • Size

    395KB

  • Sample

    240131-gc7f5aecbp

  • MD5

    8397ac0fb7fcd733f9c9909fbe360c5a

  • SHA1

    8c7db019c022fd67ac9c860c015b3eb2db7f8b90

  • SHA256

    2bcf62d414a54316c89e890fbfd85b98ab7d3b7533704d1bd77527cb0da1c60f

  • SHA512

    f49af97fb07c0294bc325be2e25d3dec5fce2c4c1baa8145b75080e7b8ee277c30468bdecb032df10b3cb8ad485873a02f8c5f390c3d82bbf5931f1609582bb7

  • SSDEEP

    1536:uQLodvXiTCLBVTU8VJHAZhBpflS2oQYU+7gpKTrG7DT+moqMJRxHD3QwcWldHwLv:uQLkLB28ePflOrC7qRtt9ldHwL93pr

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

roscript.ddns.net:5353

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      8397ac0fb7fcd733f9c9909fbe360c5a

    • Size

      395KB

    • MD5

      8397ac0fb7fcd733f9c9909fbe360c5a

    • SHA1

      8c7db019c022fd67ac9c860c015b3eb2db7f8b90

    • SHA256

      2bcf62d414a54316c89e890fbfd85b98ab7d3b7533704d1bd77527cb0da1c60f

    • SHA512

      f49af97fb07c0294bc325be2e25d3dec5fce2c4c1baa8145b75080e7b8ee277c30468bdecb032df10b3cb8ad485873a02f8c5f390c3d82bbf5931f1609582bb7

    • SSDEEP

      1536:uQLodvXiTCLBVTU8VJHAZhBpflS2oQYU+7gpKTrG7DT+moqMJRxHD3QwcWldHwLv:uQLkLB28ePflOrC7qRtt9ldHwL93pr

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks