General

  • Target

    613d620d7d8c50465b05146b31e1e5139db23fecf164ee482c130f23ad9a15ba

  • Size

    1.9MB

  • Sample

    240425-28hsvsgb83

  • MD5

    84025a1bd23886baa112be5c05f9b73b

  • SHA1

    59aae2aea80a5d3a6287b5aabe46e701c9a0569c

  • SHA256

    613d620d7d8c50465b05146b31e1e5139db23fecf164ee482c130f23ad9a15ba

  • SHA512

    3c7705c90cbe782d2e242f3ce041d15d463da158099de6fdb8f64d537014eecc522efb10dff3401f5b4bf7e753f8ce9c0dc0002e2eb3df5e0a21e55d74b4b299

  • SSDEEP

    49152:7NyPF3UVWD2U8fBOcEfV2rUld+1gqB2uKR0w8jDEuNDmn87mbS4ElDOCRccZX1qC:7NyPdUVWiU8fBOccsrUlM1lEuKRkd

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

PRECIADOS DOMI

C2

comercialnuevoano.casacam.net:7096

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      613d620d7d8c50465b05146b31e1e5139db23fecf164ee482c130f23ad9a15ba

    • Size

      1.9MB

    • MD5

      84025a1bd23886baa112be5c05f9b73b

    • SHA1

      59aae2aea80a5d3a6287b5aabe46e701c9a0569c

    • SHA256

      613d620d7d8c50465b05146b31e1e5139db23fecf164ee482c130f23ad9a15ba

    • SHA512

      3c7705c90cbe782d2e242f3ce041d15d463da158099de6fdb8f64d537014eecc522efb10dff3401f5b4bf7e753f8ce9c0dc0002e2eb3df5e0a21e55d74b4b299

    • SSDEEP

      49152:7NyPF3UVWD2U8fBOcEfV2rUld+1gqB2uKR0w8jDEuNDmn87mbS4ElDOCRccZX1qC:7NyPdUVWiU8fBOccsrUlM1lEuKRkd

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks