General

  • Target

    b0f0683358f3f66718dcdea684a959cc_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240616-az85xasajc

  • MD5

    b0f0683358f3f66718dcdea684a959cc

  • SHA1

    f59c306fbc3129d09ba4e4ad8321c72a4858209c

  • SHA256

    476dd6c64a2e5c0547956069693b4072929a9a264d05e0d7ade0ba784e22377d

  • SHA512

    4635a3bb6f88fb9c8ece85e13510ecbc8b0f5e955ce234c23a70833c3a93398c96a8847e06c0913dbff01228b3198850b7f530e90095f0e91e2efc7cd8f6b36b

  • SSDEEP

    24576:qQYf/Dlmx2Wm/49ghA0DB1uOXO9Kl6SdOnGGcJvS3KsDcz:n4LUV9kXDBXX2cVdOGG+ucz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Strekatun RAT

Mutex

13f-03018eb703b3

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/JuGEzR6N

aes.plain

Targets

    • Target

      b0f0683358f3f66718dcdea684a959cc_JaffaCakes118

    • Size

      1.3MB

    • MD5

      b0f0683358f3f66718dcdea684a959cc

    • SHA1

      f59c306fbc3129d09ba4e4ad8321c72a4858209c

    • SHA256

      476dd6c64a2e5c0547956069693b4072929a9a264d05e0d7ade0ba784e22377d

    • SHA512

      4635a3bb6f88fb9c8ece85e13510ecbc8b0f5e955ce234c23a70833c3a93398c96a8847e06c0913dbff01228b3198850b7f530e90095f0e91e2efc7cd8f6b36b

    • SSDEEP

      24576:qQYf/Dlmx2Wm/49ghA0DB1uOXO9Kl6SdOnGGcJvS3KsDcz:n4LUV9kXDBXX2cVdOGG+ucz

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks