General

  • Target

    Windows-Search.zip

  • Size

    88.6MB

  • Sample

    240730-avk8aatamd

  • MD5

    8a2d8b0df37a8af0fecf4e0eefbed426

  • SHA1

    41f18e36f2f5c2fcc799d96b0c333ddea3232b23

  • SHA256

    5215d350f917e8f1df09581b835fb5189a00461a1041b898505bd39180203c1d

  • SHA512

    3a0a901c7e1c9ea7872930fadd2615f5927e4c888699e341ae061638a5d10fd3bd9d8b0d00fce02ea744b88f66d5f1de63913e3d06573eead131322322831c69

  • SSDEEP

    1572864:eiKsRgROA/Mv12vHTzp4tNR6ropO/CgAbGifKgS0BPNwe4NkyYnM8nMK15QkFAUy:ei3uROoMv12LzyV6rorJDiP+VwexXtnW

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

1

C2

20.82.141.111:6570

Mutex

mutex_boot-AsZzpYBmoad2u1S

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

2

C2

20.82.141.111:6576

Mutex

mutex_kernel-SLhrSjUhEXvqIIS

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      SearchFilter.exe

    • Size

      132.0MB

    • MD5

      75b63c0f5dcee7c6000edcc705167207

    • SHA1

      598c078a840f152480065d95ffb99127b1ef6e08

    • SHA256

      59909bf0cc831cdb3553fa31eceeb8be207a65d2072da65fb6b38577770b036f

    • SHA512

      727d0be33710d2c9421dc5e2e4d39479f683f4aff650a7b419c13f429762609885fba43ff370bf23dc3c6e82cf74cf383c59bb58739a14ddfc0fafad07d430da

    • SSDEEP

      1572864:U4sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVK:Zl/BkVVPBDgmPKa5Wnu3X7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • UAC bypass

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      d3dcompiler_47.dll

    • Size

      3.9MB

    • MD5

      3b4647bcb9feb591c2c05d1a606ed988

    • SHA1

      b42c59f96fb069fd49009dfd94550a7764e6c97c

    • SHA256

      35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7

    • SHA512

      00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50

    • SSDEEP

      49152:OS7PQ+besnXqRtHKzhwSsz6Ku1FVVOsLQuouM0MeAD36FqxLfeIgSNwLTzHiU2Ir:O4PhqqFVUsLQl6FqVCLTzHxJIMd

    Score
    3/10
    • Target

      ffmpeg.dll

    • Size

      2.5MB

    • MD5

      1bb0e1140ef08440ad47d80b70dbf742

    • SHA1

      c2e4243bad76b465b5ab39865ac023db1632d6b0

    • SHA256

      c0d9edde3864d9450744f4bc526a98608b629aeed01c6647f600802e1b1cf671

    • SHA512

      29d71e3bd7df7014a03e26ca6ee5b59ff6e3d06096742fae5dec6282abd1f0d2f24c886a503e3a691d38cc68e0da504a7f657dcec4758b640a1a523d3eeaa57a

    • SSDEEP

      49152:YKM7YWN1tYNFKtJPP5f+8xH6UahvIxi9xrBYHZU7ewdCUQFdqQi9muA:YKM7YWNT2Kt9QoaUalEi9xqZ29dA

    Score
    3/10
    • Target

      libEGL.dll

    • Size

      371KB

    • MD5

      e0a5d1a5d55dffb55513acb736cef1c1

    • SHA1

      307fc023790af5bf3d45678de985e8e9f34896f7

    • SHA256

      aa5da4005c76cfe5195b69282b2ad249d7dc2300bbc979592bd67315fc30c669

    • SHA512

      094e23869fd42c60f83e0f4d1a2cd1a29d2efd805ac02a01ce9700b8e7b0e39e52fe86503264a0298c85f0d02b38620f1e773f2ea981f3049aeba3104b04253f

    • SSDEEP

      6144:6FVfk760MmXXwvT3WpVgvpqwm9SPECshBZeD6EHh:267rjnpVgvpqwm93rIW

    Score
    3/10
    • Target

      libGLESv2.dll

    • Size

      6.4MB

    • MD5

      44f7c21b6010048e0dcdc43d83ebd357

    • SHA1

      d0a4dfd8dbae1a8421c3043315d78ecd84502b16

    • SHA256

      f6259a9b9c284ee5916447dd9d0ba051c2908c9d3662d42d8bbe6ce6d65a37de

    • SHA512

      7e03538dd8e798d0e808a8fc6e149e83de9f8404e839900f6c9535da6aac8ef4d5c31044e547dde34dcece1255fab9a9255fa069a99fcb08e49785d812b3887c

    • SSDEEP

      98304:ZHYQkvdLN+UNQR14/hr5njmwSNDBVO0Bz7arD+0t1t0zA5Lgs2+A1tCw:itvwq/hr5jmwSVBJBz7arQA+sq1tC

    Score
    3/10
    • Target

      locales/af.pak

    • Size

      368KB

    • MD5

      7e51349edc7e6aed122bfa00970fab80

    • SHA1

      eb6df68501ecce2090e1af5837b5f15ac3a775eb

    • SHA256

      f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97

    • SHA512

      69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d

    • SSDEEP

      6144:ebGJWQdLX/Wi6fR9a5DhZ2FQPnUGSBhjA636Zi2Jyn9Ybt5KXpgmLwSVxJsVxSjf:6GJW2bOi6fRmZ2OPnUThjA636Zi2Jynd

    Score
    3/10
    • Target

      locales/uk.pak

    • Size

      688KB

    • MD5

      ee70e9f3557b9c8c67bfb8dfcb51384d

    • SHA1

      fc4dfc35cde1a00f97eefe5e0a2b9b9c0149751e

    • SHA256

      54324671a161f6d67c790bfd29349db2e2d21f5012dc97e891f8f5268bdf7e22

    • SHA512

      f4e1da71cb0485851e8ebcd5d5cf971961737ad238353453db938b4a82a68a6bbaf3de7553f0ff1f915a0e6640a3e54f5368d9154b0a4ad38e439f5808c05b9f

    • SSDEEP

      12288:wrccq9nty/KiDswU1nbx05kB3IjUUmEg5KuoLNiXElqnOyh:HGX35EEK

    Score
    3/10
    • Target

      resources/NmnfgaXt2luNfmDz65AVkRBx.js

    • Size

      1.1MB

    • MD5

      92b3e2b47fd13d67cd839c0096857479

    • SHA1

      f07e6545e18e5449784270037bfca06c03acda43

    • SHA256

      1cb4d19492c8821adbf4daff078eaddf4e6fdf4f1e4104d1c97e407d75b36fcd

    • SHA512

      6cc8494c897432471135474507502eff469e1dee8f56b771e89a267ed7621f9cece479e69a413dab4643222d4dfe9de0538c58d3a4079c5ec570b1e0e7d7af81

    • SSDEEP

      6144:ZTYvYVUM3OivEmEfTaGn91F0r8Ea36UHkmM6g19/Vg6Y:FvEmEtnl0r8EU6UEUg7Vu

    Score
    3/10
    • Target

      vk_swiftshader.dll

    • Size

      4.5MB

    • MD5

      65a5705d95a0820740b3396851ff1751

    • SHA1

      a692a80bafc41ba1b29ef19890f8465b3fb20dcb

    • SHA256

      4c4b935cbb320033f504a89b1eb0a4bcb176bbd46a5981153cb1f54deb146a1c

    • SHA512

      0c5df23b96eaf952c4a498ff6d854df2b62e7631b16c2855ed37ddbadffba3dd52e7450f2e06cf094bec2e0d70d14c87a652150766d90ec8662e03123df5942d

    • SSDEEP

      98304:x2GmsucG1vUTM3SFhCrHglx7LQDCwchuW6ugI:cuuF4XhCGLQDCaI

    Score
    3/10
    • Target

      vulkan-1.dll

    • Size

      786KB

    • MD5

      a947c5d8fec95a0f24b4143ced301209

    • SHA1

      ebf3089985377a58b8431a14e22a814857287aaf

    • SHA256

      29cb256921a1b0f222c82650469d534ccdf038d1f395b3aaa9f1086918f5d3fa

    • SHA512

      75f5e055f4422b5558fc1cb3ea84fb7cbeaae6f71c786cc06c295d4ab51c0b1c84e28a7c89fe544f007dbe8e612bed4059139f1575934fe4bac8e538c674ebd3

    • SSDEEP

      24576:cJObHhG7TEnCGlrpZpjL4TB46Z5WODYsHh6g3P0zAk722:c0c7TECgpZpju46Z5WODYsHh6g3P0zA+

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks