General

  • Target

    idontwannabetrue.exe

  • Size

    45KB

  • Sample

    241116-way5as1bmq

  • MD5

    65702e476fe79a572631dc686ce6e4df

  • SHA1

    2afd23c0ed708604eb5382cdc6402b4e90a68466

  • SHA256

    7346914f0703f198aeaf4d8417ba2f729cde3e8b034e2803f94b07800d7a4e7e

  • SHA512

    0c6132ddf953b44ab98c0f118533315bc10c1eafcd6521b8e1376f856de9620b32e5b0905f783423f9b89aabd2284ad4aa36b51ff09c5850a4880ecdeb232269

  • SSDEEP

    768:Ju50dTtQpVBTWU/fShmo2qggfayJFxiOPIBzjbMgX3iUUacah3UjNMLBDZbx:Ju50dTt0y2KRG3B3bDXSUUTNMddbx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:62565

127.0.0.1:4782

127.0.0.1:1501

Cristopher11sa-62565.portmap.host:6606

Cristopher11sa-62565.portmap.host:7707

Cristopher11sa-62565.portmap.host:8808

Cristopher11sa-62565.portmap.host:62565

Cristopher11sa-62565.portmap.host:4782

Cristopher11sa-62565.portmap.host:1501

190.104.116.8:6606

190.104.116.8:7707

190.104.116.8:8808

190.104.116.8:62565

190.104.116.8:4782

190.104.116.8:1501

azxq0ap.localto.net:6606

azxq0ap.localto.net:7707

Mutex

E2qgtjRHaRSi

Attributes
  • delay

    3

  • install

    false

  • install_file

    Java updater.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      idontwannabetrue.exe

    • Size

      45KB

    • MD5

      65702e476fe79a572631dc686ce6e4df

    • SHA1

      2afd23c0ed708604eb5382cdc6402b4e90a68466

    • SHA256

      7346914f0703f198aeaf4d8417ba2f729cde3e8b034e2803f94b07800d7a4e7e

    • SHA512

      0c6132ddf953b44ab98c0f118533315bc10c1eafcd6521b8e1376f856de9620b32e5b0905f783423f9b89aabd2284ad4aa36b51ff09c5850a4880ecdeb232269

    • SSDEEP

      768:Ju50dTtQpVBTWU/fShmo2qggfayJFxiOPIBzjbMgX3iUUacah3UjNMLBDZbx:Ju50dTt0y2KRG3B3bDXSUUTNMddbx

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Modifies visibility of file extensions in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks