General

  • Target

    30072024_0827_29072024_JuneOrder.exe.bz2

  • Size

    182KB

  • Sample

    240730-kcw7yazemd

  • MD5

    0eba954ee1a3cf578c7fe3a5b3c5c40a

  • SHA1

    933ad0514e90a75bdb3af99f66f2d047794f176a

  • SHA256

    d1fba2d16b292e393bae1e2a292741a076b06c89e7254ecba7ab087d8bb496fb

  • SHA512

    d293cd34a30938f4fbd8daaa6e0c77e58f7368d1d736c97cf0adabba6d3920368691f118f93938cb7429660ee10a88b0b78a33f8bc6b7f524d2e3c472c02d166

  • SSDEEP

    3072:AIEZa6VxwU4aNwMy57LNP5gKoNp0YiZ6tWbjddW6fbG290FY1PwfjlKrt2TGn5IK:AXL/wU4aNwv57LB5BZ3bjnw290EPJkTi

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

192.228.105.2:7707

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchst.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      sample

    • Size

      510KB

    • MD5

      2b19d65705eee546214513fb65948b2a

    • SHA1

      20b6c01b9f20047fc9f3bf9baa14b5046cbc0012

    • SHA256

      106dc2ab6da5448b983e66c7c6850533006abf9176eb6ee3d58e101b83d8d47f

    • SHA512

      183bb9331b20d2f4118820bd372e5202220e29cfea2d5ae5fedd8d1a9bfaf548a9399aa604950553948899a1d75658e64480c660ce7f83bb89cd566e1385eb72

    • SSDEEP

      6144:+ldk1cWQRNTB2/Me7eC9g1HGnKBvYfew0PjZmwvhhlJdZBuUwXtgZcJeJ:+cv0NTg/XrRnKBwfOM0dayZKeJ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks