General

  • Target

    AsyncClientee.vbs

  • Size

    73KB

  • Sample

    250130-k1zyqswqhx

  • MD5

    0ec47428f6f4b7cbe56b8c4a927ed64b

  • SHA1

    3db2b1d34f94cc5d2cc2838fc156b8ef24c9bf0d

  • SHA256

    2e48003da4e90411347ae5e4945ba9b656a25bc32b23744a8d7f7e8931bdbe6e

  • SHA512

    0ead059a5174e32bae38c0686c7acda5d88bf5a0ddd3d14f8adef72de08f09a9b92913dc8818f625f0e05d1551c75630f194164a1cedfb2bcc2f3193bf69df87

  • SSDEEP

    1536:1AFd4ohVZMj7O9swhsuWlKcWE3ZgKvAVIQSG4523UoZK8sEwB71WXikKL0tXLt:1AFLZMeqwhVcz3ZZAOQSG45+UT8sEs1y

Malware Config

Extracted

Family

asyncrat

Version

| Edit by Vinom Rat

Botnet

Default

C2

69NK69.LINKPC.NET:6666

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AsyncClientee.vbs

    • Size

      73KB

    • MD5

      0ec47428f6f4b7cbe56b8c4a927ed64b

    • SHA1

      3db2b1d34f94cc5d2cc2838fc156b8ef24c9bf0d

    • SHA256

      2e48003da4e90411347ae5e4945ba9b656a25bc32b23744a8d7f7e8931bdbe6e

    • SHA512

      0ead059a5174e32bae38c0686c7acda5d88bf5a0ddd3d14f8adef72de08f09a9b92913dc8818f625f0e05d1551c75630f194164a1cedfb2bcc2f3193bf69df87

    • SSDEEP

      1536:1AFd4ohVZMj7O9swhsuWlKcWE3ZgKvAVIQSG4523UoZK8sEwB71WXikKL0tXLt:1AFLZMeqwhVcz3ZZAOQSG45+UT8sEs1y

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks