General

  • Target

    70640074D3FDAE9D73D37DB169C4E2FB.exe

  • Size

    38KB

  • Sample

    220128-1jtndsefe3

  • MD5

    70640074d3fdae9d73d37db169c4e2fb

  • SHA1

    4a05baf2027180366471de77bfe26b9e53917f7e

  • SHA256

    67741e596f4d59713a232bfb45d6cb0b2592f67b867773f72c2bb0fa2f749685

  • SHA512

    a50db1617e4d09a8e610fdffda759a6c6c4d71ea6c671bef68ddc302af855b18235eabbd75590af39986c031b895d66bc591b7369edd83252b51015a986d4939

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

20.83.245.27:1604

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      70640074D3FDAE9D73D37DB169C4E2FB.exe

    • Size

      38KB

    • MD5

      70640074d3fdae9d73d37db169c4e2fb

    • SHA1

      4a05baf2027180366471de77bfe26b9e53917f7e

    • SHA256

      67741e596f4d59713a232bfb45d6cb0b2592f67b867773f72c2bb0fa2f749685

    • SHA512

      a50db1617e4d09a8e610fdffda759a6c6c4d71ea6c671bef68ddc302af855b18235eabbd75590af39986c031b895d66bc591b7369edd83252b51015a986d4939

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks