General

  • Target

    89300e6172c5878c76b4180d35d412c1.zip

  • Size

    24KB

  • Sample

    250129-w1l8esvres

  • MD5

    89300e6172c5878c76b4180d35d412c1

  • SHA1

    cb8c90de6427ab01cae478baf2c64bf794d69c95

  • SHA256

    53d9e0c32b413d5e128844677c648aebaaeb9da32f50ce83ba95e8644f68f95b

  • SHA512

    54641b28ce89494622d56b1c17809a1c5408737f55d766947e14c163a8cf4368a291e6455468838575bf470de36567b5eb58840f6cc6d4cd48bad0f8c2ada7b4

  • SSDEEP

    384:x4lcjzXkFthvesoxBYgO64D4YKW0XhmdeAnKu/xErrKloZJpqt5:xdUFjvIYfL0XheBKu/+/Z25

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

85.31.47.31:1860

Mutex

YV7yXrqThMrn

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      RAD. N° 026487303 ACCIÓN JUDICIAL EN CURSO..vbs

    • Size

      326KB

    • MD5

      d83345b5c7d4e155a8e57631994bc7d4

    • SHA1

      d042ea6d57b57b1cad8b3e255284c9b86a392929

    • SHA256

      2d3263fdf0f73852319cdaed3604d12ee40b972f47562bfad30c1a1bb3a47787

    • SHA512

      bb14b26eb8bf8632660f661293424076bf560f591de305b2a7dba18bc7f3e9592357dbd161472b248e0de4a238fe4bf8a121217520c29e192e5654e5cca4bc9f

    • SSDEEP

      3072:VXLVmI3b0mgfmWu+ze9VOv5iG5sVhQ30Wk+70wgA11:VXLVAe9VOvp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks