General

  • Target

    d27593e8068dcc8e3739e31b0ebc5190N.exe

  • Size

    267KB

  • Sample

    240816-m4hvqs1ckg

  • MD5

    d27593e8068dcc8e3739e31b0ebc5190

  • SHA1

    ea9686170a7094e0541e48774b1688ce203f8a48

  • SHA256

    8bad37792d9e68fccedf51dcf152838e800ba353f5d602ef72fff87cb3ab24dd

  • SHA512

    f215d97a07104c0b87267a29105620c58c69868bc599357e8d20c40b751bc697ad8822cf9e1934b5e01721154a928f0282148d480c96e5500f4d171bf305ebe1

  • SSDEEP

    3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/d:WFzDqa86hV6uRRqX1evPlwA1

Malware Config

Extracted

Family

asyncrat

Version

0.4.9G

C2

corporation.warzonedns.com:9341

Mutex

480-28105c055659

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      d27593e8068dcc8e3739e31b0ebc5190N.exe

    • Size

      267KB

    • MD5

      d27593e8068dcc8e3739e31b0ebc5190

    • SHA1

      ea9686170a7094e0541e48774b1688ce203f8a48

    • SHA256

      8bad37792d9e68fccedf51dcf152838e800ba353f5d602ef72fff87cb3ab24dd

    • SHA512

      f215d97a07104c0b87267a29105620c58c69868bc599357e8d20c40b751bc697ad8822cf9e1934b5e01721154a928f0282148d480c96e5500f4d171bf305ebe1

    • SSDEEP

      3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/d:WFzDqa86hV6uRRqX1evPlwA1

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks