Resubmissions

General

  • Target

    https://mega.nz/file/NN03QRTb#VCCQWKKJ1h075jpQcyGbGeZ7Bt4qnwD_R24CCDuDV2c

  • Sample

    240606-jx3psabf41

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

95.216.52.21:7575

Mutex

xdnqiaxygefjfoolgo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

ynotylvkeqpk

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      https://mega.nz/file/NN03QRTb#VCCQWKKJ1h075jpQcyGbGeZ7Bt4qnwD_R24CCDuDV2c

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Installed Components in the registry

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks