General

  • Target

    b5d5b900b45c64f696a4dfb06e9789c3.exe

  • Size

    6.9MB

  • Sample

    220117-jetzxshbhm

  • MD5

    b5d5b900b45c64f696a4dfb06e9789c3

  • SHA1

    816ae1383da25eb1c27a20a136fddb8aa03df181

  • SHA256

    4e7105da7face5917f66842ba73810d29826cb971140f9da2b0efb7a37de3c0e

  • SHA512

    c02e351218566a49f8f8abc3c81cfa12fd8734a39c8c2286392e0fc4eaf867224aebb5f757cb81f8fa0420f25c01806382a94dc8c354708a224db2c7ec5a1156

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

8.tcp.ngrok.io:18921

8.tcp.ngrok.io:1234

8.tcp.ngrok.io:4040

Mutex

EMV

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    1

  • install

    false

  • install_file

    Svchost.exe

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      b5d5b900b45c64f696a4dfb06e9789c3.exe

    • Size

      6.9MB

    • MD5

      b5d5b900b45c64f696a4dfb06e9789c3

    • SHA1

      816ae1383da25eb1c27a20a136fddb8aa03df181

    • SHA256

      4e7105da7face5917f66842ba73810d29826cb971140f9da2b0efb7a37de3c0e

    • SHA512

      c02e351218566a49f8f8abc3c81cfa12fd8734a39c8c2286392e0fc4eaf867224aebb5f757cb81f8fa0420f25c01806382a94dc8c354708a224db2c7ec5a1156

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks