General

  • Target

    Ui Updater.exe

  • Size

    85KB

  • Sample

    241123-1w2jrsvnbm

  • MD5

    063025975333195143418fae4fc78cf5

  • SHA1

    0286aa10e6705fe0752f2dd52ab9b6d9ba8610a1

  • SHA256

    a7731137a8d24944b7e002922c499883098d1cdfcecf2a6202064beb906bc21d

  • SHA512

    6f25ec5c470446b1f76b7478dff364b78f0393e72db8530c67dc874a6a3e9f49e3468ad5a25a6183e57c0d111b7502fc03d501bd470c43b46b79081c0b9ba3c5

  • SSDEEP

    1536:RQSEyt49G4p/dwVrZEX8gSK3eQfGG8f5EXUkrdRbeaPgFg4dRDKejcbJe2PPsXC:RQ19ZIZW3nfGG8fCzrbxgFPKeIbBPsS

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

more-entered.gl.at.ply.gg:2000

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Ui Updater.exe

    • Size

      85KB

    • MD5

      063025975333195143418fae4fc78cf5

    • SHA1

      0286aa10e6705fe0752f2dd52ab9b6d9ba8610a1

    • SHA256

      a7731137a8d24944b7e002922c499883098d1cdfcecf2a6202064beb906bc21d

    • SHA512

      6f25ec5c470446b1f76b7478dff364b78f0393e72db8530c67dc874a6a3e9f49e3468ad5a25a6183e57c0d111b7502fc03d501bd470c43b46b79081c0b9ba3c5

    • SSDEEP

      1536:RQSEyt49G4p/dwVrZEX8gSK3eQfGG8f5EXUkrdRbeaPgFg4dRDKejcbJe2PPsXC:RQ19ZIZW3nfGG8fCzrbxgFPKeIbBPsS

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks