General

  • Target

    ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d

  • Size

    426KB

  • Sample

    240829-2l4f2sxajp

  • MD5

    eafad63994d7226e68bb54d7a9396e91

  • SHA1

    acc49ad9a05403be2079f48954a397251a5b124b

  • SHA256

    ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d

  • SHA512

    6d8181c1229a47333114c9b0e1ee2f333301bc3e774b9d7ecee8d5ae87751bd605508f9fd4ce77a20673996bcb9dc2ccc70f62e837fe0089bdc0478a4d301f4b

  • SSDEEP

    3072:bAa0zeTpio4F+B1MFnMUE2XAVLis8sIQaaBbnkuKMdcKQsd7WyxM1J0C1HzKyL:lTpq+w1MzaAVJ51LKMjpWy2J0oKyL

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

USA ONLY

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:5454

127.0.0.1:7898

127.0.0.1:8987

verygoodpc.line.pm:6606

verygoodpc.line.pm:7707

verygoodpc.line.pm:8808

verygoodpc.line.pm:5454

verygoodpc.line.pm:7898

verygoodpc.line.pm:8987

verygoodpcs.theworkpc.com:6606

verygoodpcs.theworkpc.com:7707

verygoodpcs.theworkpc.com:8808

verygoodpcs.theworkpc.com:5454

verygoodpcs.theworkpc.com:7898

verygoodpcs.theworkpc.com:8987

Mutex

mc-neo-host

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d

    • Size

      426KB

    • MD5

      eafad63994d7226e68bb54d7a9396e91

    • SHA1

      acc49ad9a05403be2079f48954a397251a5b124b

    • SHA256

      ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d

    • SHA512

      6d8181c1229a47333114c9b0e1ee2f333301bc3e774b9d7ecee8d5ae87751bd605508f9fd4ce77a20673996bcb9dc2ccc70f62e837fe0089bdc0478a4d301f4b

    • SSDEEP

      3072:bAa0zeTpio4F+B1MFnMUE2XAVLis8sIQaaBbnkuKMdcKQsd7WyxM1J0C1HzKyL:lTpq+w1MzaAVJ51LKMjpWy2J0oKyL

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Modifies WinLogon for persistence

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks