General

  • Target

    OAPI009876678.exe

  • Size

    219KB

  • Sample

    220117-bgna6agffn

  • MD5

    520a5acc037347adfa2ad7158b0f020d

  • SHA1

    7350f710b93b7f8461228e160d392c064505e11c

  • SHA256

    2799478f81991ca4ba86ccf7a234f95199cf3743f6a1112f20666b6ce104e557

  • SHA512

    66270c90c571c1109f651a56e42b9cd47aca9391d2919e5a9bcfd690dd9f940341c681968908220526b172ea527a6a99b4de0310694ec95b3082dafe6988ee1d

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

185.222.57.80:6275

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    10

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      OAPI009876678.exe

    • Size

      219KB

    • MD5

      520a5acc037347adfa2ad7158b0f020d

    • SHA1

      7350f710b93b7f8461228e160d392c064505e11c

    • SHA256

      2799478f81991ca4ba86ccf7a234f95199cf3743f6a1112f20666b6ce104e557

    • SHA512

      66270c90c571c1109f651a56e42b9cd47aca9391d2919e5a9bcfd690dd9f940341c681968908220526b172ea527a6a99b4de0310694ec95b3082dafe6988ee1d

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks