General

  • Target

    Client.bin

  • Size

    47KB

  • Sample

    220708-lwmchsdeg3

  • MD5

    8667aaa559656bb8b0ed6595b7af4639

  • SHA1

    22c55234155117e375a91b7e65996f5489cb95a5

  • SHA256

    22680a572a04b805b87f79ef02be69ec4b18b53d886f630007899ec1edf83dc9

  • SHA512

    7cbb4b40f24c65b416def1c18ad71a963b6740c3929a0bfa932219b0b0715b9f7a88f8de8fbd7244e09fd40fbaa00c776de519b1a4b2280a6632b159037c12c7

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:7707

venelix.duckdns.org:7707

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Client.bin

    • Size

      47KB

    • MD5

      8667aaa559656bb8b0ed6595b7af4639

    • SHA1

      22c55234155117e375a91b7e65996f5489cb95a5

    • SHA256

      22680a572a04b805b87f79ef02be69ec4b18b53d886f630007899ec1edf83dc9

    • SHA512

      7cbb4b40f24c65b416def1c18ad71a963b6740c3929a0bfa932219b0b0715b9f7a88f8de8fbd7244e09fd40fbaa00c776de519b1a4b2280a6632b159037c12c7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

    • Async RAT payload

MITRE ATT&CK Matrix

Tasks