General

  • Target

    d320aea9453c098f7b07ac1da85a9e7e.bin

  • Size

    931B

  • Sample

    241018-cajj3azbne

  • MD5

    268b882e124ebb64cc5c747cfd3760a1

  • SHA1

    657eefdfa1dd83e80655ffe77deb3f2b8e53765f

  • SHA256

    f18b89650fa93a5d72575293d09140f57e9b390ac1079968b3f3b2b53cbe6663

  • SHA512

    1fb191cef56225cf48a7ed165311d61f216d284d3ea007c8dfce6b6b9a2488f5677dd6ee1c2aa831e85c1bf22931e9f6f416d2a9177a2023acd2cf68624e59e4

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

New-Encrypt

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/M1nmWeTA

aes.plain

Targets

    • Target

      a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs

    • Size

      5KB

    • MD5

      d320aea9453c098f7b07ac1da85a9e7e

    • SHA1

      1fcf8469a5b7197cca73c9665f43505d7a6c6ae3

    • SHA256

      a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613

    • SHA512

      2d883ac60a84b0e919274daec84bc5a6dbed9f1eb40f5dab6c1473d321211e245a27dcdc2ed4e9f9ed7ab9e08048ee3d34da333ad5cb950a2d934b59b20fb7bd

    • SSDEEP

      48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTTS:etPXyTuGZOrHTu5Viajr

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks