General

  • Target

    50bc873b8e08fdc5832350f377a1b5a7_JaffaCakes118

  • Size

    569KB

  • Sample

    240331-je7k1sga9w

  • MD5

    50bc873b8e08fdc5832350f377a1b5a7

  • SHA1

    868d150864b3a467238314be1d21a4835fed7c68

  • SHA256

    2ac9fe88102fbe8cc50d40228e302e2f37fcc006009697609eb5d55aab5c940e

  • SHA512

    842b38e394e2b6ef46b2d797a036b52b7ff06c2d3ea3489d9bcbaa8325659c2cffb8714a2ec12c4378a66ddcc19a5ef3fedde0e7ae0e829de1abe6809d12d163

  • SSDEEP

    6144:PC4w8juap56y9dg4sIo9ZCf6YRZDYooV3FtlyPG4wYeVKiEgQaratgMZ:Knapvg4sz9dYRZsx1tvpEVar3MZ

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

1

C2

185.157.160.136:1973

Mutex

df4Rtg34dFjwr7ujp3

Attributes
  • delay

    38

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      50bc873b8e08fdc5832350f377a1b5a7_JaffaCakes118

    • Size

      569KB

    • MD5

      50bc873b8e08fdc5832350f377a1b5a7

    • SHA1

      868d150864b3a467238314be1d21a4835fed7c68

    • SHA256

      2ac9fe88102fbe8cc50d40228e302e2f37fcc006009697609eb5d55aab5c940e

    • SHA512

      842b38e394e2b6ef46b2d797a036b52b7ff06c2d3ea3489d9bcbaa8325659c2cffb8714a2ec12c4378a66ddcc19a5ef3fedde0e7ae0e829de1abe6809d12d163

    • SSDEEP

      6144:PC4w8juap56y9dg4sIo9ZCf6YRZDYooV3FtlyPG4wYeVKiEgQaratgMZ:Knapvg4sz9dYRZsx1tvpEVar3MZ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks