General

  • Target

    systemData.exe

  • Size

    63KB

  • Sample

    240607-nhx8zafc8z

  • MD5

    1041676fa499ccf503bbd83e34bfa723

  • SHA1

    ecf580a3883f191aa6884987b7df7d89eae63f92

  • SHA256

    6a441a93c71d7a04b5d53a85f078ce40c3a5b151bb6e202b5c5b7e585696bc48

  • SHA512

    b6e83249c6c6424d3ffff75a801471933443652313b0e5b8a226e09e26fb5cb9f9601e9818fbdc82d4f1a432df9903f2695da8cf68f622c6de6db45fe06d49ab

  • SSDEEP

    1536:HX9xf3ZnKUoXLH1xb7z+/Ubqh95mu0dpqKmY7:HvI7C/Ubq2Gz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:8080

127.0.0.1:18775

4.tcp.eu.ngrok.io:8080

4.tcp.eu.ngrok.io:18775

Attributes
  • delay

    1

  • install

    true

  • install_file

    systemData.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      systemData.exe

    • Size

      63KB

    • MD5

      1041676fa499ccf503bbd83e34bfa723

    • SHA1

      ecf580a3883f191aa6884987b7df7d89eae63f92

    • SHA256

      6a441a93c71d7a04b5d53a85f078ce40c3a5b151bb6e202b5c5b7e585696bc48

    • SHA512

      b6e83249c6c6424d3ffff75a801471933443652313b0e5b8a226e09e26fb5cb9f9601e9818fbdc82d4f1a432df9903f2695da8cf68f622c6de6db45fe06d49ab

    • SSDEEP

      1536:HX9xf3ZnKUoXLH1xb7z+/Ubqh95mu0dpqKmY7:HvI7C/Ubq2Gz

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks