General

  • Target

    5369e645742b60732edfb0d8c7dd4d97

  • Size

    63KB

  • Sample

    220130-pz7peabbhn

  • MD5

    5369e645742b60732edfb0d8c7dd4d97

  • SHA1

    b7d318614043daa02d0e5e21f4ebb7b37c34a67d

  • SHA256

    4743f18e28808ce90f8c9197c112fe5ceeb91c20f41b92a00034e2884cab1907

  • SHA512

    5183eb0bb3cf1af8b9366ba9b14cc55ad8d9313749f2b4e6abe2ca9e07e8fa23be8aef7692bd4e5ef4592e6090fabc386ce4e8fdc61cda947d8a6c6bccacd2ea

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

bigrussianfloppa.duckdns.org:8000

Mutex

Mutex_qwqdanchun

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    1

  • install

    true

  • install_file

    Churkaebanaya.exe

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      5369e645742b60732edfb0d8c7dd4d97

    • Size

      63KB

    • MD5

      5369e645742b60732edfb0d8c7dd4d97

    • SHA1

      b7d318614043daa02d0e5e21f4ebb7b37c34a67d

    • SHA256

      4743f18e28808ce90f8c9197c112fe5ceeb91c20f41b92a00034e2884cab1907

    • SHA512

      5183eb0bb3cf1af8b9366ba9b14cc55ad8d9313749f2b4e6abe2ca9e07e8fa23be8aef7692bd4e5ef4592e6090fabc386ce4e8fdc61cda947d8a6c6bccacd2ea

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

    • Async RAT payload

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks