General

  • Target

    683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.zip

  • Size

    17.0MB

  • Sample

    250208-z2k9asvraq

  • MD5

    5445e105eeed69d451f549cc405f6849

  • SHA1

    dfbebd966bdf53a115131d1c5cb3643014627e3a

  • SHA256

    79e7dc4d75d1fecc0eded18ad869092aa27134e16a2789984de619d326c19edb

  • SHA512

    8d7b48e5e05105872466c154352c8eef35109c90380dae44ce2fc2bfce464a59abd3b6b29d776b0ec2ab7e7006123910abafd0ec974e37fec96387ae642da3e2

  • SSDEEP

    393216:V2ciCVzkLAqTcWEItZQZbmx6NCRv2sayY866fWaWeVlDWlqHOw:V29CVGAqIrItZQrcRP1B66+5eV5/

Malware Config

Extracted

Family

asyncrat

Version

v1.2.2

Botnet

Default

C2

27.124.4.150:51311

Mutex

owgonhhweps

Attributes
  • delay

    5

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe

    • Size

      17.1MB

    • MD5

      4ba81cd6a16ffd3bf5e0e7338df60a5f

    • SHA1

      e92ec4e696661c50d2ccbe05e44d19c413f58d18

    • SHA256

      683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c

    • SHA512

      3113b8c8eb65a3a927c10762d24fd871fa9ca29df2f5121272b6a8e46ec48a8cd1b6957ebfa4bc70084e68f14cf7eeb5f676c7d65672fe0aa0a4865a78c1c26c

    • SSDEEP

      393216:/Fj0IBCLzNxfYrp0ei6EMF9AFulgy8k7JaajjfHnDY5Su:/FXBmNOrpHi6E0Uk7wSnk

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks