General

  • Target

    18208ba6920a74e8ca7bd244571ae383.bin

  • Size

    6KB

  • Sample

    241109-bgv11atfpq

  • MD5

    72a5dd7dd7297d595cea6a21498a5585

  • SHA1

    1e18c1dc8d6e925485d6f07be3b39b8964a771f8

  • SHA256

    b3e938ea7471932a05eb27214a4050fe96c80a371201aec89759e7ff7900491a

  • SHA512

    875b8c90b1e4e44a890fbede3c487b2a07058ad6c73326b67704959f98cae61df3a2fc35d71467bb067529b0ff46da163e1cad36b89d07a4c33849cce7d4233d

  • SSDEEP

    96:zGW2Ns/ORLAW12tZFePcSGATHnSMd+pnXFsZCKaptYZMim+G7ZLlYEDERrGJ:h+lRZeZkbXTHx8n1M2OK+G7DhME

Malware Config

Extracted

Family

asyncrat

Version

AWS | RxR

Botnet

Default

C2

lastofdr51.mywire.org:6606

lastofdr51.mywire.org:7707

lastofdr51.mywire.org:8808

Nightmare15.strangled.net:6606

Nightmare15.strangled.net:7707

Nightmare15.strangled.net:8808

darkenssnight.ydns.eu:6606

darkenssnight.ydns.eu:7707

darkenssnight.ydns.eu:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    SystemUpdate.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1c30611e8e3a99301ffe1102d4f70c44fd2d7593878dcdf4178002777fe6e920.exe

    • Size

      12KB

    • MD5

      18208ba6920a74e8ca7bd244571ae383

    • SHA1

      61797d94d14935a588a799e8dc943355eb6f4022

    • SHA256

      1c30611e8e3a99301ffe1102d4f70c44fd2d7593878dcdf4178002777fe6e920

    • SHA512

      87fdb3de8301e8f2dd7b8601ee468e64387ce72616af21153d129f236bf28a6dd81e1ba905cd534281bdc94aca1d85898ec6e64170cab2bb58d3c608002f64f3

    • SSDEEP

      192:4Qt7If16ODCvuuYT6DI6kDmBwqVT9N62uEiGe5PF:A16O5CDIJDawqrklEiP5P

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks