General

  • Target

    JaffaCakes118_89609c6e1373264312594816f10bb5c7b4c742fd674f1d6c1c87c032df69d673

  • Size

    474KB

  • Sample

    241222-qshx5szqdn

  • MD5

    764db22f48202df2bf9b275aed1d1b41

  • SHA1

    81b4ba9d11bb65791c5c88704e9e707665a80bd2

  • SHA256

    89609c6e1373264312594816f10bb5c7b4c742fd674f1d6c1c87c032df69d673

  • SHA512

    a6bce27d3cea0f397db9050aefda293ee97019d68de53a935305bd397c6e236da697f534c2a7893601b89cced5a7c86108b67286aac5a759d3df1570be6b34ee

  • SSDEEP

    12288:oR8BgAQhWrv3B2fKdbYTX9XOyIHbrG4cZ0gdG/52Vn1SJtUp:buAQhuv3kfKdbYTX5I79b+k2V1YSp

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

37.0.14.198:6161

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    .exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      38e1bbae005365e92cf80aa6ef199d5107af57fde3afb02c31dc1bde875c68f7

    • Size

      694KB

    • MD5

      32c67f99f3c95ba5e1816ca208f9b723

    • SHA1

      c1e29ecea3c87d671448b9dbcc8d8c67b0d14b7e

    • SHA256

      38e1bbae005365e92cf80aa6ef199d5107af57fde3afb02c31dc1bde875c68f7

    • SHA512

      578526bda2f08948475726f36bf247aabeb8f3941f95153d6786bc0db6e43bad44502ef1757bae2bb7c6f6bd0a4bd51e9b33ae363be293b75f490a26c03795f8

    • SSDEEP

      12288:btoKggb2iNdvpc++pd1yIBbrk4ct0gdK/5SVns2M2TgN/0s:5oKgK1XpSpGIZn9+YSVsggi

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks