General

  • Target

    LPC Scanned Docs-Copyright ©‮GNP.CPL.exe

  • Size

    4KB

  • Sample

    241118-jmhxma1rd1

  • MD5

    3416cd045697fbdce8ee3af98e0c8d81

  • SHA1

    b488215ca71436c17f9b75559a46bc37f812d1bf

  • SHA256

    1a12342028912118504c3efb1145c4bc713cca6eb591866f26b2d7d9adc192ca

  • SHA512

    2e4ec4a4fb29397966a9336d0d0731f97db60225a4807c13543c9a3e60e1bdec073a468d76257fae78e73cf0d4c34eccf7481185266a2325dcfb6a6707336bc2

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

194.11.246.69:6606

194.11.246.69:7707

194.11.246.69:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Notepad.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      LPC Scanned Docs-Copyright ©‮GNP.CPL.exe

    • Size

      4KB

    • MD5

      3416cd045697fbdce8ee3af98e0c8d81

    • SHA1

      b488215ca71436c17f9b75559a46bc37f812d1bf

    • SHA256

      1a12342028912118504c3efb1145c4bc713cca6eb591866f26b2d7d9adc192ca

    • SHA512

      2e4ec4a4fb29397966a9336d0d0731f97db60225a4807c13543c9a3e60e1bdec073a468d76257fae78e73cf0d4c34eccf7481185266a2325dcfb6a6707336bc2

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks