General

  • Target

    BL. NO. ANSMUNDAR3621.r00

  • Size

    268KB

  • Sample

    211022-a1jlmsbhdj

  • MD5

    7fdc8da9db5f3fc6eb1163cc2e8cdb62

  • SHA1

    723924a03d8732c8b9f2a685953d58965ec140a5

  • SHA256

    bc078ef255581e77f7ae948d471a9fd65bf8555dba30cb4162c72ab91eac9b21

  • SHA512

    2b903056614f048c0905b1a721c495aafe5bd7b2bd8aacfe25e8015a16af1ef8d84248f1eb1338a4cd18f74c0e8ca26d48307911ba6fb2a3c27860d964b1f276

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

185.222.57.71:00783

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      BL. NO. ANSMUNDAR3621.exe

    • Size

      343KB

    • MD5

      6e313f49084c58fcd006489103bac31a

    • SHA1

      cfb76b45950b867da23054c1df26ce8e7a3f8274

    • SHA256

      408e8ea1cbe31a44e822f1673cbfbe79dbd2938a1e449e61a661c1cceda8f322

    • SHA512

      e75348da00f0e5d3089a38f8400b18cee22a057f6dc7da3068e49875d024e8512e90b9bdeaad3f866b4dfd0388b72952a4fbdb0a78c845cebaf4f253de1be2a2

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks