General

  • Target

    56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278.exe

  • Size

    95KB

  • Sample

    240808-bmz7xa1ejf

  • MD5

    bed020cbba2610b31af66357db97c10c

  • SHA1

    d4c68500e5f8125b60976af885172253a435cc78

  • SHA256

    56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278

  • SHA512

    08fb0c1fa421dbdd61aa57d2adc7127cf7def12e88db054515be18ec05207e6f93ad775316137267d77e987e0145439e293af4784eb9b17826d9cb39fdedd931

  • SSDEEP

    1536:6GCx35SC0o7Yrcpv41Efir+XKEkRi/gN2ieJOW56+Cj5sVMH:6GO35SBrcpgSfPLkEybeJL56+CtYMH

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

103.174.191.71:6606

103.174.191.71:7707

103.174.191.71:8808

Mutex

HFE2t0VQV50q

Attributes
  • delay

    3

  • install

    false

  • install_file

    game.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

H1C6pa3caMCcJ1BG

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278.exe

    • Size

      95KB

    • MD5

      bed020cbba2610b31af66357db97c10c

    • SHA1

      d4c68500e5f8125b60976af885172253a435cc78

    • SHA256

      56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278

    • SHA512

      08fb0c1fa421dbdd61aa57d2adc7127cf7def12e88db054515be18ec05207e6f93ad775316137267d77e987e0145439e293af4784eb9b17826d9cb39fdedd931

    • SSDEEP

      1536:6GCx35SC0o7Yrcpv41Efir+XKEkRi/gN2ieJOW56+Cj5sVMH:6GO35SBrcpgSfPLkEybeJL56+CtYMH

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks