General

  • Target

    PO_Contract_ANR07152112_20210715181907__110.r17

  • Size

    202KB

  • Sample

    211029-xtkaxsafbm

  • MD5

    697c8de38b66f300b4708d8a3282ff18

  • SHA1

    70ce44fc8113aafc25bc19379b256019ba67723f

  • SHA256

    a2c975fb3de3396708f18aa2ff9cba6112cb04eb91818b415473081cbc18ebd7

  • SHA512

    74b7883e32fc75729477ecb51b550223bdd06b425ea05d381a15e0ea1eb73b91f820dfd5e19d52e9fc454f73d9374b3a86f3c7fef078905f363e3606f9738617

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

185.222.57.71:00783

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    20

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      PO_Contract_ANR07152112_20210715181907__110.exe

    • Size

      259KB

    • MD5

      59a60d464d1a53db32c8f9d1851e861b

    • SHA1

      33ed4fa55a5a6e2ac4689360dcce5420de49c1b2

    • SHA256

      d845c164a62d42c00550da72c49c92296d6e73e6aca723915c0a0ebbd5b494cc

    • SHA512

      e85b976cc95b45587907168abcc6829eba479a9679f56b5ac5edabcb1947d4f8666ef8c00bde2fddf7080cd8caf2cdad43cfe964211c7b5a92fb4d7fe4ceb19b

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks