General

  • Target

    dnlib.exe

  • Size

    12KB

  • Sample

    240303-rn3mesce64

  • MD5

    6967b97ce4ff4524883a196a97736275

  • SHA1

    6fdf2b9adc16b40a06bacc7db0abee917ef4abd3

  • SHA256

    e2bddf56324addac02678a7fd8d9c3da24ad55132883ad826a1a60eaf4e4a034

  • SHA512

    c71525d49e36975cb43535cff5176409163b14f53b644e3d161fd56f7514f0affbda051541a07d9af4cdc45a564dfad20a23584701499a0f03e531219c9f72be

  • SSDEEP

    192:zLlo6IXsbK9CLPN0LWyJUMmYVY2QQq33WrmRaadrq8uSF3:PljIeyCLPN0CUUMme3o3mrmRJUSF

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

def

C2

37.18.62.18:8060

Mutex

era2312swe12-1213rsgdkms23

Attributes
  • delay

    1

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      dnlib.exe

    • Size

      12KB

    • MD5

      6967b97ce4ff4524883a196a97736275

    • SHA1

      6fdf2b9adc16b40a06bacc7db0abee917ef4abd3

    • SHA256

      e2bddf56324addac02678a7fd8d9c3da24ad55132883ad826a1a60eaf4e4a034

    • SHA512

      c71525d49e36975cb43535cff5176409163b14f53b644e3d161fd56f7514f0affbda051541a07d9af4cdc45a564dfad20a23584701499a0f03e531219c9f72be

    • SSDEEP

      192:zLlo6IXsbK9CLPN0LWyJUMmYVY2QQq33WrmRaadrq8uSF3:PljIeyCLPN0CUUMme3o3mrmRJUSF

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks