General

  • Target

    32ecfe02dff3f6e8ca454c6d1d9b3d07.exe

  • Size

    47KB

  • Sample

    210724-5m46x9j7gj

  • MD5

    32ecfe02dff3f6e8ca454c6d1d9b3d07

  • SHA1

    6a8a9c9703e474a6a6a8249271a33c275cbecae4

  • SHA256

    11cf7e4634686248d94f71743785791878f2018da0da09f240f9f8a9c766b60d

  • SHA512

    09a14f0ac68867cae57b2457fce3f33e56824a77e82302233b53a4e9336e83a7c50ec9a086b96fe85a06bf0231cd0b25846c843ce9d807f4073b9e5b0e6004c4

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7A

C2

20.52.33.123:2222

Mutex

ujjllffofcjsf

Attributes
  • aes_key

    dVkssK6blbyujUd40JLKxrxb4iq7dm8V

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Default

  • host

    20.52.33.123

  • hwid

    1

  • install_file

  • install_folder

    %AppData%

  • mutex

    ujjllffofcjsf

  • pastebin_config

    null

  • port

    2222

  • version

    0.5.7A

aes.plain

Targets

    • Target

      32ecfe02dff3f6e8ca454c6d1d9b3d07.exe

    • Size

      47KB

    • MD5

      32ecfe02dff3f6e8ca454c6d1d9b3d07

    • SHA1

      6a8a9c9703e474a6a6a8249271a33c275cbecae4

    • SHA256

      11cf7e4634686248d94f71743785791878f2018da0da09f240f9f8a9c766b60d

    • SHA512

      09a14f0ac68867cae57b2457fce3f33e56824a77e82302233b53a4e9336e83a7c50ec9a086b96fe85a06bf0231cd0b25846c843ce9d807f4073b9e5b0e6004c4

    Score
    10/10
    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

MITRE ATT&CK Matrix

Tasks