General

  • Target

    4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf.wsf

  • Size

    210KB

  • Sample

    250128-n8k2bsxqfy

  • MD5

    d282ee245b417b8864b9a1d090b0a3b8

  • SHA1

    b529d5b75920ef439ba509fddeb03049976414f4

  • SHA256

    4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf

  • SHA512

    f94b5c7e3c8b420248d39f2c86b8c3835ea048aaf2e3181802b366a1f17ae1d364fa2d727931f6af88ae46f721bea8ebdad4c939dbbe7917518f74f158a93030

  • SSDEEP

    6144:rUFHpUFHpUFHpUFHpUFHpUFHpUFHqUFHpUFHpUFHrUFHpUFHpUFHpUFHB:rUnUnUnUnUnUnUkUnUnUlUnUnUnUT

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

00000001

C2

81.10.39.58:7077

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf.wsf

    • Size

      210KB

    • MD5

      d282ee245b417b8864b9a1d090b0a3b8

    • SHA1

      b529d5b75920ef439ba509fddeb03049976414f4

    • SHA256

      4679cbf91c459006b2b61a1fcdad2fe872be6bb0177e703ff9324c3ff75875bf

    • SHA512

      f94b5c7e3c8b420248d39f2c86b8c3835ea048aaf2e3181802b366a1f17ae1d364fa2d727931f6af88ae46f721bea8ebdad4c939dbbe7917518f74f158a93030

    • SSDEEP

      6144:rUFHpUFHpUFHpUFHpUFHpUFHpUFHqUFHpUFHpUFHrUFHpUFHpUFHpUFHB:rUnUnUnUnUnUnUkUnUnUlUnUnUnUT

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks