General

  • Target

    https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fdocs.google.com%2fuc%3fexport%3ddownload%26id%3d1WzgwW-oHUQ-jD5xuUngYVv8tCotgsKES&umid=d0735f25-ada1-11ef-90ed-6045bd047a68&auth=2877182e97994b86f9bf77cfc08cae9153406ffd-08f672a1222e37f5f5aee50340e112dc61adb309

  • Sample

    241202-x42yqaylf1

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

XXX

C2

94.103.125.231:2626

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fdocs.google.com%2fuc%3fexport%3ddownload%26id%3d1WzgwW-oHUQ-jD5xuUngYVv8tCotgsKES&umid=d0735f25-ada1-11ef-90ed-6045bd047a68&auth=2877182e97994b86f9bf77cfc08cae9153406ffd-08f672a1222e37f5f5aee50340e112dc61adb309

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks