Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/01/2025, 13:44 UTC

250108-q18hrssjg1 10

08/01/2025, 13:26 UTC

250108-qpnzzs1nhv 10

07/01/2025, 21:25 UTC

250107-z9w1rs1ndl 10

07/01/2025, 21:06 UTC

250107-zxtpwazrfl 10

07/01/2025, 20:29 UTC

250107-y9yzpayrdn 10

General

  • Target

    https://gofile.io/d/YHZWCx

  • Sample

    250108-q18hrssjg1

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Domain

C2

jojo.ath.cx:1414

Mutex

AsyncMutex_7SI8OkPne

Attributes
  • delay

    3

  • install

    false

  • install_file

    dllscv.exe

  • install_folder

    %AppData%

aes.plain
1
T7Adi3Jnc86CP1KVXUt4k5Ebe2ZotBR8

Targets

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.