General

  • Target

    2024-05-24_190ea8056a4b0d8af79cd7fc18e0261a_megazord

  • Size

    2.9MB

  • Sample

    240524-bs29fsgb6s

  • MD5

    190ea8056a4b0d8af79cd7fc18e0261a

  • SHA1

    f78df6968942e2ee33609919c77bca012b3981f6

  • SHA256

    ab1acf6f80a0be5966252c95f03116b4496c10bad6cd260b13b9006dac5886be

  • SHA512

    267106698966317f767b27808a55e2eeb371f977ab85d67537da33743c5b1892c5b422994fd5a210c411bf9bec8849b16f76253dddd936e626fd2bfbd900ac68

  • SSDEEP

    24576:8RoBHi3buy4toE1jC6Ayo2xhWLbSPlqRvc68XzRVGvNB5VA0UC1dUUKj/SZ8j3g5:+oKmo4jC6TovnRUC1doj/Hg4C04pi+

Malware Config

Extracted

Family

asyncrat

Version

2.0.0

Botnet

Default

C2

webwhatsapp.cc:65503

Mutex

ShiningForceRatMutex_cs_cs_cs

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2024-05-24_190ea8056a4b0d8af79cd7fc18e0261a_megazord

    • Size

      2.9MB

    • MD5

      190ea8056a4b0d8af79cd7fc18e0261a

    • SHA1

      f78df6968942e2ee33609919c77bca012b3981f6

    • SHA256

      ab1acf6f80a0be5966252c95f03116b4496c10bad6cd260b13b9006dac5886be

    • SHA512

      267106698966317f767b27808a55e2eeb371f977ab85d67537da33743c5b1892c5b422994fd5a210c411bf9bec8849b16f76253dddd936e626fd2bfbd900ac68

    • SSDEEP

      24576:8RoBHi3buy4toE1jC6Ayo2xhWLbSPlqRvc68XzRVGvNB5VA0UC1dUUKj/SZ8j3g5:+oKmo4jC6TovnRUC1doj/Hg4C04pi+

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detects executables attemping to enumerate video devices using WMI

    • Detects executables containing the string DcRatBy

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks