General

  • Target

    1.ps1

  • Size

    188KB

  • Sample

    220425-xd5a6ahbel

  • MD5

    bf0828394ed5062ac6d092724abbc38e

  • SHA1

    94f0b01132fc768bdd8158cb3aa4ede1e73cbc1e

  • SHA256

    d0194d0b1da16bc51698d9d246f6c99ad71c2da1a3da4c06d99969749382326c

  • SHA512

    974d4cfbe54d4f38421d0b63ee3a199180952f4075568dae72a5d8f75cda86684e9f1408b22b2aee322290b25c32c7d9092ac58aed24707ccf162e09952423b0

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

2

C2

anderione.com:5253

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1.ps1

    • Size

      188KB

    • MD5

      bf0828394ed5062ac6d092724abbc38e

    • SHA1

      94f0b01132fc768bdd8158cb3aa4ede1e73cbc1e

    • SHA256

      d0194d0b1da16bc51698d9d246f6c99ad71c2da1a3da4c06d99969749382326c

    • SHA512

      974d4cfbe54d4f38421d0b63ee3a199180952f4075568dae72a5d8f75cda86684e9f1408b22b2aee322290b25c32c7d9092ac58aed24707ccf162e09952423b0

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Async RAT payload

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks