General

  • Target

    PO_Contract_ANR07152112_20210715181907__110.exe

  • Size

    259KB

  • Sample

    211029-psq33saacn

  • MD5

    59a60d464d1a53db32c8f9d1851e861b

  • SHA1

    33ed4fa55a5a6e2ac4689360dcce5420de49c1b2

  • SHA256

    d845c164a62d42c00550da72c49c92296d6e73e6aca723915c0a0ebbd5b494cc

  • SHA512

    e85b976cc95b45587907168abcc6829eba479a9679f56b5ac5edabcb1947d4f8666ef8c00bde2fddf7080cd8caf2cdad43cfe964211c7b5a92fb4d7fe4ceb19b

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

185.222.57.71:00783

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    20

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      PO_Contract_ANR07152112_20210715181907__110.exe

    • Size

      259KB

    • MD5

      59a60d464d1a53db32c8f9d1851e861b

    • SHA1

      33ed4fa55a5a6e2ac4689360dcce5420de49c1b2

    • SHA256

      d845c164a62d42c00550da72c49c92296d6e73e6aca723915c0a0ebbd5b494cc

    • SHA512

      e85b976cc95b45587907168abcc6829eba479a9679f56b5ac5edabcb1947d4f8666ef8c00bde2fddf7080cd8caf2cdad43cfe964211c7b5a92fb4d7fe4ceb19b

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks