General

  • Target

    3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe

  • Size

    48KB

  • Sample

    210926-1xwd5sfcfp

  • MD5

    852b69a95f1ae83d9142fced3450977b

  • SHA1

    a48b15998be1e979530994675da17566d1769769

  • SHA256

    3b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19

  • SHA512

    23b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9

Score
10/10

Malware Config

Targets

    • Target

      3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe

    • Size

      48KB

    • MD5

      852b69a95f1ae83d9142fced3450977b

    • SHA1

      a48b15998be1e979530994675da17566d1769769

    • SHA256

      3b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19

    • SHA512

      23b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks