Resubmissions

14/01/2025, 23:37

250114-3maqsstkcs 10

14/01/2025, 23:34

250114-3kd1fatjgv 10

14/01/2025, 23:27

250114-3feq6svngl 10

General

  • Target

    lossless scaling.zip

  • Size

    3.5MB

  • Sample

    250114-3maqsstkcs

  • MD5

    6c87ed78fd187262be3d49889b1dd32b

  • SHA1

    12e581a8ed77d2094928d76cfcbf8540995b1e6d

  • SHA256

    7dcd9d23296c19c7f6a68507770bb6ff559cabcf1253d82a8becc74f0d1d7b47

  • SHA512

    b7c180073971c5cd55aa30f0a21a49057f967f87862a53ccd220823619cfe19f92650c5561ff6924eefcb78af152117acfaf25fdd05e42e87547ffe1f64cedfd

  • SSDEEP

    98304:bFotLrw5RAlk44jx4f5af86aO2AFd4Cyc8EAFS2WO:Bo4yEx4f5afbapvZOO

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

Egypt2.camdvr.org:301

Mutex

MaterxMutex_Egypt2

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      lossless scaling/Lossless Scaling.exe

    • Size

      155KB

    • MD5

      1bb432c7d79983c0438f9c05d7ab2a42

    • SHA1

      fd9d24d6417273c04a046e4da2bd51f6ac287939

    • SHA256

      69c131d4901fb0f0192a2a97fb48012df696c5bd08a38c34e1553a3bdb9942ac

    • SHA512

      1ab2802727c66834e349f79b51847c79c9f340e3b716add2b4ec8c25d3bd1096c3f82596d2efbe57e922945f965aafe72b1bae30d6fcedfd7799595a5ca190ce

    • SSDEEP

      3072:AcjJ6p7RATueBb6sKGyLY1hhhhhhhhhhhhhhhhhhhhhhhOCD:AcjJ6pWTuet1V1hhhhhhhhhhhhhhhhh/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks