Resubmissions

21-02-2025 21:12

250221-z2l6lazpav 10

21-02-2025 19:57

250221-yphrzayrbk 10

21-02-2025 19:34

250221-yag7wsyncm 7

21-02-2025 18:54

250221-xkezvaxmbw 10

21-02-2025 18:38

250221-xaa8xaxphn 10

21-02-2025 16:33

250221-t2tmsawjer 10

21-02-2025 16:20

250221-ttcdjavmfz 10

General

  • Target

    test.txt

  • Size

    18B

  • Sample

    250221-z2l6lazpav

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:443

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    deded.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      test.txt

    • Size

      18B

    • MD5

      5b3f97d48c8751bd031b7ea53545bdb6

    • SHA1

      88be3374c62f23406ec83bb11279f8423bd3f88d

    • SHA256

      d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

    • SHA512

      ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Async RAT payload

    • Renames multiple (3870) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks