General

  • Target

    f451a02acc3dc89a0b3091a19404b150N.exe

  • Size

    267KB

  • Sample

    240815-z71wyazbmj

  • MD5

    f451a02acc3dc89a0b3091a19404b150

  • SHA1

    c6c81d728e584dcc806cb3ee36fba90d8cd300fb

  • SHA256

    b063352ee62460586b4189c505b8d40d1a9aa57ce0eb8d561d760593f621864d

  • SHA512

    2f1bff6e366371c2a7a1b4214a25cbb396263cbf28f6042e55a9f916d18883cbd31f671985dad3934327925935ab3bb6458975b0b2e3ec30d0f7787e8873bed4

  • SSDEEP

    3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/d:WFzDqa86hV6uRRqX1evPlwAF

Malware Config

Extracted

Family

asyncrat

Version

0.4.9G

C2

corporation.warzonedns.com:9341

Mutex

480-28105c055659

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      f451a02acc3dc89a0b3091a19404b150N.exe

    • Size

      267KB

    • MD5

      f451a02acc3dc89a0b3091a19404b150

    • SHA1

      c6c81d728e584dcc806cb3ee36fba90d8cd300fb

    • SHA256

      b063352ee62460586b4189c505b8d40d1a9aa57ce0eb8d561d760593f621864d

    • SHA512

      2f1bff6e366371c2a7a1b4214a25cbb396263cbf28f6042e55a9f916d18883cbd31f671985dad3934327925935ab3bb6458975b0b2e3ec30d0f7787e8873bed4

    • SSDEEP

      3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/d:WFzDqa86hV6uRRqX1evPlwAF

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks