General

  • Target

    FF7E550B84C874875FED760F65B5B6E6.exe

  • Size

    322KB

  • Sample

    210629-9fslydajh6

  • MD5

    ff7e550b84c874875fed760f65b5b6e6

  • SHA1

    74eddfe67d56a745edd329694ee50d7dfed4554a

  • SHA256

    6b664d6b89eabbac55c8927fa29d2669ba629a40f1abbf12d76f8d9b14e4facb

  • SHA512

    0f843da02a3506a459a4010a57865abb2b189bc3c8e55f00d63eba9d8ce90b1eb5f28c2aea28a305ef22b2d235b09dfb40b86a4e7740803fb4d687f7ece5fbf5

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

alemdar571.duckdns.org:59

alemdar571.duckdns.org:18

alemdar571.duckdns.org:4784

alemdar571.duckdns.org:5900

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    pqERwlgY87kmK2i7mcxt7JtedarItP1u

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Güncelleme

  • host

    alemdar571.duckdns.org

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    59,18,4784,5900

  • version

    0.5.7B

aes.plain

Targets

    • Target

      FF7E550B84C874875FED760F65B5B6E6.exe

    • Size

      322KB

    • MD5

      ff7e550b84c874875fed760f65b5b6e6

    • SHA1

      74eddfe67d56a745edd329694ee50d7dfed4554a

    • SHA256

      6b664d6b89eabbac55c8927fa29d2669ba629a40f1abbf12d76f8d9b14e4facb

    • SHA512

      0f843da02a3506a459a4010a57865abb2b189bc3c8e55f00d63eba9d8ce90b1eb5f28c2aea28a305ef22b2d235b09dfb40b86a4e7740803fb4d687f7ece5fbf5

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks