General

  • Target

    b7f0467ea05cdb14eea0f67fd09e8bc6.bin

  • Size

    75KB

  • Sample

    240803-dyz3ds1hjn

  • MD5

    d3271cf7a9dd362b96477dedd5924f8b

  • SHA1

    f3d9595e2b264f02cdd3a2e716c15b3f079d4ac0

  • SHA256

    e8594a68a1b573d8cec8418bb410be8d8e3d3cec1017130640dd5aab770059ad

  • SHA512

    8698faff2f436d040529f687825a22bf1c228aa47390eb1dc07f21eae8f3407e57180fd66cb43c9da6f23af2c844787d93f0d0610d3cbebbf2aafc846bb31744

  • SSDEEP

    1536:LusTsnfs9EqAPNWi6OMOeRiqgngV3V+6Rh7NUHtvY3Ka:LulsETA/+egqCS3PetvY3l

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

parsher.ddnsfree.com:6606

parsher.ddnsfree.com:7707

parsher.ddnsfree.com:8808

Mutex

fakET5WLXUHP

Attributes
  • delay

    3

  • install

    false

  • install_file

    System32.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      111aa30a320d763f875d21e66345c86e8580ccbe0d50e99733991caff1d2201b.exe

    • Size

      78KB

    • MD5

      b7f0467ea05cdb14eea0f67fd09e8bc6

    • SHA1

      231ee0739e614251bc3d648885c77f6f8d0cbd58

    • SHA256

      111aa30a320d763f875d21e66345c86e8580ccbe0d50e99733991caff1d2201b

    • SHA512

      21fb8ab40f31987ebf977983012035d29034471c0f84779a636857e9a52110856155bc6ead9ac2e34dc29cbdee82c98941e4eafa4c7f73dac01b65b76c26ac97

    • SSDEEP

      1536:d6zKpOqlUTuWJR5UpJN6almL4REvOWTt0BO5FHBas9hhQ0YH:0zOOqeSQLUpJNflJEWWp0Q5z59hm7H

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks