General

  • Target

    68d23586eef34a76a3e58cfc1bfdcb80_JaffaCakes118

  • Size

    45KB

  • Sample

    240729-31pf4sxdrq

  • MD5

    68d23586eef34a76a3e58cfc1bfdcb80

  • SHA1

    7218ab8b9e02553b466361c043caa09a350e42b2

  • SHA256

    dcaf6810871062a1a5a292c8e46667a8b7de908d292513ef1c443929ce8897c5

  • SHA512

    20c09977afc6d0d787b481274ec7db6110691d342dbb25ddf9408a5e8a853cf79ff158e9552239d71fa4aafd247e72fdac0f653c92346945c8fbb84252cd72e3

  • SSDEEP

    768:nugaNTokqd97WUHgAKpmo2q7HKjGKG6PIyzjbFgX3iUaLtlW8XHBWBDZ/x:nugaNToTdQT2mKYDy3bCXSFtl5x4d/x

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:4444

127.0.0.1:16155

127.0.0.1:15558

2.tcp.eu.ngrok.io:6606

2.tcp.eu.ngrok.io:7707

2.tcp.eu.ngrok.io:8808

2.tcp.eu.ngrok.io:4444

2.tcp.eu.ngrok.io:16155

2.tcp.eu.ngrok.io:15558

Mutex

Mutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    MicrosoftService.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      68d23586eef34a76a3e58cfc1bfdcb80_JaffaCakes118

    • Size

      45KB

    • MD5

      68d23586eef34a76a3e58cfc1bfdcb80

    • SHA1

      7218ab8b9e02553b466361c043caa09a350e42b2

    • SHA256

      dcaf6810871062a1a5a292c8e46667a8b7de908d292513ef1c443929ce8897c5

    • SHA512

      20c09977afc6d0d787b481274ec7db6110691d342dbb25ddf9408a5e8a853cf79ff158e9552239d71fa4aafd247e72fdac0f653c92346945c8fbb84252cd72e3

    • SSDEEP

      768:nugaNTokqd97WUHgAKpmo2q7HKjGKG6PIyzjbFgX3iUaLtlW8XHBWBDZ/x:nugaNToTdQT2mKYDy3bCXSFtl5x4d/x

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks