General

  • Target

    dbf61f566a642cdd0df3fc1d078debb8_JaffaCakes118

  • Size

    156KB

  • Sample

    240406-fqkc3sca88

  • MD5

    dbf61f566a642cdd0df3fc1d078debb8

  • SHA1

    0294ef20386693a5699bc4e57653f966f0eaf028

  • SHA256

    aead3b29e4eb3a2c5499b67eb81a609bd85944a1d7ec6b9557be527a0c566929

  • SHA512

    4de09065e244d791d8c909a1c6cd689063f8318af2648498f9cf435be19b666aba096f1b2946a75200cacee5a63d705fb545c42a9d6f7a5dbf49d3cd0865467c

  • SSDEEP

    3072:bqOQcs8pmp5W4J44tDlsAU/UwtRUsUUc2fjRs+DVs+A1+HX5wsOZ4T3EMXckbNGV:bqLl2V7H6sA4bEMXc4VLvTGc

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

winx.xcapdatap.capetown:6204

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      dbf61f566a642cdd0df3fc1d078debb8_JaffaCakes118

    • Size

      156KB

    • MD5

      dbf61f566a642cdd0df3fc1d078debb8

    • SHA1

      0294ef20386693a5699bc4e57653f966f0eaf028

    • SHA256

      aead3b29e4eb3a2c5499b67eb81a609bd85944a1d7ec6b9557be527a0c566929

    • SHA512

      4de09065e244d791d8c909a1c6cd689063f8318af2648498f9cf435be19b666aba096f1b2946a75200cacee5a63d705fb545c42a9d6f7a5dbf49d3cd0865467c

    • SSDEEP

      3072:bqOQcs8pmp5W4J44tDlsAU/UwtRUsUUc2fjRs+DVs+A1+HX5wsOZ4T3EMXckbNGV:bqLl2V7H6sA4bEMXc4VLvTGc

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks