General

  • Target

    rufus-4.5.exe

  • Size

    1.4MB

  • Sample

    240713-zytfhazbpd

  • MD5

    129e5bbf63d8299d027186eafe92754a

  • SHA1

    c50bd94af6af186edc536ec6ff83bdd233586618

  • SHA256

    c6e6cdba209f899e5087f1a1a4babc759414b4a687b60ba4bce62b6b37e8e82b

  • SHA512

    a87a4b44ec3ce37a0da546a805f688bd3a68b52d662a294b8193717f383938f99fa68e50dddf9f012aad7b51e98fd017f6b757ca15332d79a2bb6b882c379a05

  • SSDEEP

    24576:K9+dyknYGIOeicfIgMFbnMt0t6Hmx5N2MJJMex8R00nea7jNqeveiWRKreZMIlEE:K9+dpYGD6HeMet6HmjZMD6KeChVW5ZDB

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      rufus-4.5.exe

    • Size

      1.4MB

    • MD5

      129e5bbf63d8299d027186eafe92754a

    • SHA1

      c50bd94af6af186edc536ec6ff83bdd233586618

    • SHA256

      c6e6cdba209f899e5087f1a1a4babc759414b4a687b60ba4bce62b6b37e8e82b

    • SHA512

      a87a4b44ec3ce37a0da546a805f688bd3a68b52d662a294b8193717f383938f99fa68e50dddf9f012aad7b51e98fd017f6b757ca15332d79a2bb6b882c379a05

    • SSDEEP

      24576:K9+dyknYGIOeicfIgMFbnMt0t6Hmx5N2MJJMex8R00nea7jNqeveiWRKreZMIlEE:K9+dpYGD6HeMet6HmjZMD6KeChVW5ZDB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Renames multiple (6776) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Downloads MZ/PE file

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks