General

  • Target

    Order._1.exe

  • Size

    288KB

  • Sample

    240730-k44q4awamj

  • MD5

    587be0c9be93274c3d38ef27c3a50aa4

  • SHA1

    6808c0da1276c7ad2021ffb7c0b8d743f5c87b35

  • SHA256

    cf4ff6cb9038c130e7b6d76daf2af62d018541c3d561d5e0aba8a34614ebc5d8

  • SHA512

    5d2dbadb93ae2d91c3e7af58be9b28a7270a86b1c3b2bfbae64f232a06f26efa72162dc4adb22ce1f269429eecb2d4b5b44e1c1494658de702c1f2dad0c9c879

  • SSDEEP

    3072:Cq6+ouCpk2mpcWJ0r+QNTBf2Wk1qXkXRA4XTZ5N:Cldk1cWQRNTB+l8KN

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

192.228.105.2:7707

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchst.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Order._1.exe

    • Size

      288KB

    • MD5

      587be0c9be93274c3d38ef27c3a50aa4

    • SHA1

      6808c0da1276c7ad2021ffb7c0b8d743f5c87b35

    • SHA256

      cf4ff6cb9038c130e7b6d76daf2af62d018541c3d561d5e0aba8a34614ebc5d8

    • SHA512

      5d2dbadb93ae2d91c3e7af58be9b28a7270a86b1c3b2bfbae64f232a06f26efa72162dc4adb22ce1f269429eecb2d4b5b44e1c1494658de702c1f2dad0c9c879

    • SSDEEP

      3072:Cq6+ouCpk2mpcWJ0r+QNTBf2Wk1qXkXRA4XTZ5N:Cldk1cWQRNTB+l8KN

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks