General

  • Target

    b1b6896b56865e3cf306b27273571684872a9fc8147262d7f0f8c8f7b33b82b9

  • Size

    561KB

  • Sample

    220705-2prawsfgg2

  • MD5

    ac6c59b4841b47bbd42ec091a3d8a2e6

  • SHA1

    2dd5bd5e0d9a6010d1fba5e617889d4a12dfbaa9

  • SHA256

    b1b6896b56865e3cf306b27273571684872a9fc8147262d7f0f8c8f7b33b82b9

  • SHA512

    aa3821e867153f4887a1168ccff5ed064247df6c6e76a8349951f1e287250cdf41cf65edbf1adf1deafbafcbf4557a6f4378d58c129d9c3fc6a272a838958d02

Score
10/10

Malware Config

Targets

    • Target

      b1b6896b56865e3cf306b27273571684872a9fc8147262d7f0f8c8f7b33b82b9

    • Size

      561KB

    • MD5

      ac6c59b4841b47bbd42ec091a3d8a2e6

    • SHA1

      2dd5bd5e0d9a6010d1fba5e617889d4a12dfbaa9

    • SHA256

      b1b6896b56865e3cf306b27273571684872a9fc8147262d7f0f8c8f7b33b82b9

    • SHA512

      aa3821e867153f4887a1168ccff5ed064247df6c6e76a8349951f1e287250cdf41cf65edbf1adf1deafbafcbf4557a6f4378d58c129d9c3fc6a272a838958d02

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks