General

  • Target

    Roblox Gen V1.2.7z

  • Size

    18KB

  • Sample

    240713-tkgxnazcma

  • MD5

    d2cb69e5d03e5870167a06d93329abd7

  • SHA1

    2a424c8a83089cba8df5122656756409463b0a1b

  • SHA256

    0ccce65290f211bd6c32d4b62267149387be9061a66aaf895e605f44c11501d3

  • SHA512

    089e92ec5d9249fd856f1380c0578cebed9a7d1b78bc371674ad101ff7e8844322a6453b495fd4a7d403451ede7da65bbd734484c4dfcdeb9c01fd5103889e56

  • SSDEEP

    384:R4nVGxinkoNU8khuMwDYZQLUCROQAtO0PrsIuaAcLU+ZoGwjVU:RWVGckhhuMfZQLD/Ao0luaAQUly

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

PcgXxmrsqCMH

Attributes
  • delay

    3

  • install

    true

  • install_file

    regergerg.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Roblox Gen V1.2.7z

    • Size

      18KB

    • MD5

      d2cb69e5d03e5870167a06d93329abd7

    • SHA1

      2a424c8a83089cba8df5122656756409463b0a1b

    • SHA256

      0ccce65290f211bd6c32d4b62267149387be9061a66aaf895e605f44c11501d3

    • SHA512

      089e92ec5d9249fd856f1380c0578cebed9a7d1b78bc371674ad101ff7e8844322a6453b495fd4a7d403451ede7da65bbd734484c4dfcdeb9c01fd5103889e56

    • SSDEEP

      384:R4nVGxinkoNU8khuMwDYZQLUCROQAtO0PrsIuaAcLU+ZoGwjVU:RWVGckhhuMfZQLD/Ao0luaAQUly

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks