General

  • Target

    loader.bat

  • Size

    540B

  • Sample

    241127-v9jcfszkhp

  • MD5

    a589333e5f49d10e2f2cad3f7315db41

  • SHA1

    37c5bea8569e3bfd0caece0b8d88d817eab73e16

  • SHA256

    65b18e0843829b1d85ce47307aba784ee659a2e2a164c584155211d764bb4ec3

  • SHA512

    6b73eccb11430d34b4e74074a050985ee3211751b8e7bd50d94afc55b4b7e54f33f85f98e5f460278675368984169c02d7feb9eccc9284844901147ddb75544a

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

one-accordance.gl.at.ply.gg:9590

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows Defender.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

66.66.146.74:9511

Mutex

nwJFeGdDXcL2

Attributes
  • delay

    3

  • install

    true

  • install_file

    System32.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      loader.bat

    • Size

      540B

    • MD5

      a589333e5f49d10e2f2cad3f7315db41

    • SHA1

      37c5bea8569e3bfd0caece0b8d88d817eab73e16

    • SHA256

      65b18e0843829b1d85ce47307aba784ee659a2e2a164c584155211d764bb4ec3

    • SHA512

      6b73eccb11430d34b4e74074a050985ee3211751b8e7bd50d94afc55b4b7e54f33f85f98e5f460278675368984169c02d7feb9eccc9284844901147ddb75544a

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks