General

  • Target

    Client.exe

  • Size

    47KB

  • Sample

    240526-av9kwagb6t

  • MD5

    29aec1e80d556ddaea848196398fcc85

  • SHA1

    efd928f0c29ea9ec9790797f544e730796e431f2

  • SHA256

    d494670dad941c5f2f58a3ba4e6a5dfb2eb70265a14ef02db2937c8d679086eb

  • SHA512

    75b811b4251f568dcd0cb4a6bb22c67475d979b2f54a729b44ea2d09cefc4894dbc80bcbdf0b9238fc4a3c357e8d675d8453084a620e94e47175f29915dae79c

  • SSDEEP

    768:H3QgrILqiGm+LiAtelDSN+iV08YbygeHxQRSR31ybvEgK/JTRVc6KN:H39qAtKDs4zb1Cxp3KnkJTRVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

127.0.0.1:22

127.0.0.1:23

ilovabby.ddns.net:8848

ilovabby.ddns.net:22

ilovabby.ddns.net:23

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windowsupdate.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Client.exe

    • Size

      47KB

    • MD5

      29aec1e80d556ddaea848196398fcc85

    • SHA1

      efd928f0c29ea9ec9790797f544e730796e431f2

    • SHA256

      d494670dad941c5f2f58a3ba4e6a5dfb2eb70265a14ef02db2937c8d679086eb

    • SHA512

      75b811b4251f568dcd0cb4a6bb22c67475d979b2f54a729b44ea2d09cefc4894dbc80bcbdf0b9238fc4a3c357e8d675d8453084a620e94e47175f29915dae79c

    • SSDEEP

      768:H3QgrILqiGm+LiAtelDSN+iV08YbygeHxQRSR31ybvEgK/JTRVc6KN:H39qAtKDs4zb1Cxp3KnkJTRVclN

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks