General

  • Target

    bc81c1f42f33236e77ec08654b84fe226e6565015b0fe961a739a19e219703e5

  • Size

    45KB

  • Sample

    220119-sydlqabahm

  • MD5

    9e08ad4c7063a1655e5d72bbf26d3880

  • SHA1

    0799aa66a3b27ef678b7438d8872f4702e9d2a18

  • SHA256

    bc81c1f42f33236e77ec08654b84fe226e6565015b0fe961a739a19e219703e5

  • SHA512

    bdc08c61368847b31d4e716ade7b03d4d6e08640cc5dda39118a9a661916f51560749aa27f8b0e5bd576e73fad783b89fc55da14b33fa0646f2ed0f0301370ab

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

ssonn.v6.rocks:7707

sson.dnsup.net:7707

Mutex

PLPL

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      bc81c1f42f33236e77ec08654b84fe226e6565015b0fe961a739a19e219703e5

    • Size

      45KB

    • MD5

      9e08ad4c7063a1655e5d72bbf26d3880

    • SHA1

      0799aa66a3b27ef678b7438d8872f4702e9d2a18

    • SHA256

      bc81c1f42f33236e77ec08654b84fe226e6565015b0fe961a739a19e219703e5

    • SHA512

      bdc08c61368847b31d4e716ade7b03d4d6e08640cc5dda39118a9a661916f51560749aa27f8b0e5bd576e73fad783b89fc55da14b33fa0646f2ed0f0301370ab

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks