General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
Os3wCmVfxWlB
Attributes
-
delay
3
-
install
true
-
install_file
fuck.exe
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
https://github.com/Dfmaaa/MEMZ-virus
-
Asyncrat family
-
Modifies visibility of file extensions in Explorer
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Pre-OS Boot
1Bootkit
1