General

  • Target

    temps.exe

  • Size

    63KB

  • Sample

    240615-whn93azard

  • MD5

    bf056ef6ab656719cc5b1a0efaac990b

  • SHA1

    14e0ed9edeb65a47aa1a14bd94a6c72293b1c787

  • SHA256

    9fe019bc58d7696c3658ebe88f4a7d2cee682236872353ffe4bd92fd86c18be9

  • SHA512

    a23d0e24e287a232ebfc0bd35b4922693743dc8b6885a159bdf71d972cc3e3a104ba2dcf5487acba5175902946a332940c48e37b31bb76f245b090a7444e0929

  • SSDEEP

    768:b7yb0xqDayjrHrN78xIC8A+Xjzwyr3aLhAwqhJTFAR9n1+T4GSBGHmDbDcph0oWN:CQMLVv6hALhJmRYUbyhY/5ukdpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

0.tcp.eu.ngrok.io:14406

Attributes
  • delay

    1

  • install

    true

  • install_file

    ALSO.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      temps.exe

    • Size

      63KB

    • MD5

      bf056ef6ab656719cc5b1a0efaac990b

    • SHA1

      14e0ed9edeb65a47aa1a14bd94a6c72293b1c787

    • SHA256

      9fe019bc58d7696c3658ebe88f4a7d2cee682236872353ffe4bd92fd86c18be9

    • SHA512

      a23d0e24e287a232ebfc0bd35b4922693743dc8b6885a159bdf71d972cc3e3a104ba2dcf5487acba5175902946a332940c48e37b31bb76f245b090a7444e0929

    • SSDEEP

      768:b7yb0xqDayjrHrN78xIC8A+Xjzwyr3aLhAwqhJTFAR9n1+T4GSBGHmDbDcph0oWN:CQMLVv6hALhJmRYUbyhY/5ukdpqKmY7

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks