General

  • Target

    packetinjector.exe

  • Size

    56KB

  • Sample

    241222-a6whdswney

  • MD5

    2a89c71539aea7e20f15469ec6bed996

  • SHA1

    7765fbdecda515f0046bd15b134851f919617ebd

  • SHA256

    cc6e66c0672e82d334213a6a8d8b7e7246d658b9aa5454342de8c5ac43ac7f1a

  • SHA512

    ce95772617f97c57dc4cf56dff6827e79ffc586fbd62ecaa3ba5fcd1c31c87749fdeabf6f2c350f356d3a03510165f43dc4a71f57b71ea420ccee28446fcbe48

  • SSDEEP

    1536:yuIadTYUN2eTBWfGLGbaZPE3RoXpCdHd0CRoF/:yuIeTYUN2YBWfGqbaZAoX8HeF/

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:16052

127.0.0.1:7000

serveo.net:6606

serveo.net:7707

serveo.net:8808

serveo.net:16052

serveo.net:7000

0.tcp.eu.ngrok.io:6606

0.tcp.eu.ngrok.io:7707

0.tcp.eu.ngrok.io:8808

0.tcp.eu.ngrok.io:16052

0.tcp.eu.ngrok.io:7000

Mutex

4dmeA4NOupaJ

Attributes
  • delay

    3

  • install

    true

  • install_file

    VantaPatcher.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      packetinjector.exe

    • Size

      56KB

    • MD5

      2a89c71539aea7e20f15469ec6bed996

    • SHA1

      7765fbdecda515f0046bd15b134851f919617ebd

    • SHA256

      cc6e66c0672e82d334213a6a8d8b7e7246d658b9aa5454342de8c5ac43ac7f1a

    • SHA512

      ce95772617f97c57dc4cf56dff6827e79ffc586fbd62ecaa3ba5fcd1c31c87749fdeabf6f2c350f356d3a03510165f43dc4a71f57b71ea420ccee28446fcbe48

    • SSDEEP

      1536:yuIadTYUN2eTBWfGLGbaZPE3RoXpCdHd0CRoF/:yuIeTYUN2YBWfGqbaZAoX8HeF/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks