General

  • Target

    README‮txt.SCR

  • Size

    3.6MB

  • Sample

    241231-pq8kcazqb1

  • MD5

    67fa781a0df1aea8159a22c0390023f3

  • SHA1

    d3641ee05ddd0a652a9004894f09b484336f115e

  • SHA256

    c59878f34eb08565dde137d3da8f37185c07b01de149b4c210497703c737605a

  • SHA512

    2f7fb249fd1e4097928adffd40b5131002b6fb47a26248d92f0781f6510dbb4e382febd2bfc7755970baf2f4c90d48591ca3edc08d10ed0491df9ee4575eff2f

  • SSDEEP

    98304:AkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:AkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      README‮txt.SCR

    • Size

      3.6MB

    • MD5

      67fa781a0df1aea8159a22c0390023f3

    • SHA1

      d3641ee05ddd0a652a9004894f09b484336f115e

    • SHA256

      c59878f34eb08565dde137d3da8f37185c07b01de149b4c210497703c737605a

    • SHA512

      2f7fb249fd1e4097928adffd40b5131002b6fb47a26248d92f0781f6510dbb4e382febd2bfc7755970baf2f4c90d48591ca3edc08d10ed0491df9ee4575eff2f

    • SSDEEP

      98304:AkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:AkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks