General

  • Target

    44e407b3de4a9865ab747bdca810b0b9

  • Size

    606KB

  • Sample

    220805-xr3dqadghp

  • MD5

    44e407b3de4a9865ab747bdca810b0b9

  • SHA1

    6eb199e6837432d8acb98c03b22277f340726372

  • SHA256

    da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5

  • SHA512

    db8e1652a6e8d90450114641f3573b9423bce4c27c237af49a59dc44acf929580cdf59e5c216391ef87c27c52fc610653d19bce2d1507e4d8f310b7d6dee8a4b

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

91.193.75.135:3030

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      44e407b3de4a9865ab747bdca810b0b9

    • Size

      606KB

    • MD5

      44e407b3de4a9865ab747bdca810b0b9

    • SHA1

      6eb199e6837432d8acb98c03b22277f340726372

    • SHA256

      da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5

    • SHA512

      db8e1652a6e8d90450114641f3573b9423bce4c27c237af49a59dc44acf929580cdf59e5c216391ef87c27c52fc610653d19bce2d1507e4d8f310b7d6dee8a4b

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks