General

  • Target

    leclient.exe

  • Size

    63KB

  • Sample

    241116-mm2xaavdqe

  • MD5

    516f81d3d2bd81638c90c4bedec6601a

  • SHA1

    3722275b4a7cf17133c11d01d57889b860adfa39

  • SHA256

    178bf6d0bc3dc22ee2887cb5535bbd74d107780bcd77f6e6d0139dd46e593164

  • SHA512

    adc0d412e0a122ee66b61ccaebed5150c797d58b0ec1b5e7ea137878f27ad70c03c2039ffd285339c3143730927d3dea38463554ecf908644259419d7319c649

  • SSDEEP

    1536:e5a9jPpYciRUTjJvywE68dPkSTUrsG5eMyevGbbkwqDPRuGbUVclN:e5a9jPpYciRUTjJv868dc9rsTMHvGbbe

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

90.49.19.120:4782

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    salenegro.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      leclient.exe

    • Size

      63KB

    • MD5

      516f81d3d2bd81638c90c4bedec6601a

    • SHA1

      3722275b4a7cf17133c11d01d57889b860adfa39

    • SHA256

      178bf6d0bc3dc22ee2887cb5535bbd74d107780bcd77f6e6d0139dd46e593164

    • SHA512

      adc0d412e0a122ee66b61ccaebed5150c797d58b0ec1b5e7ea137878f27ad70c03c2039ffd285339c3143730927d3dea38463554ecf908644259419d7319c649

    • SSDEEP

      1536:e5a9jPpYciRUTjJvywE68dPkSTUrsG5eMyevGbbkwqDPRuGbUVclN:e5a9jPpYciRUTjJv868dc9rsTMHvGbbe

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Modifies Windows Defender Real-time Protection settings

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Blocklisted process makes network request

    • Possible privilege escalation attempt

    • Drops startup file

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks