General

  • Target

    8c7068ecf9168d899f1e67971f0f20b590ece3c4e60d45bc0a90100eb111868a

  • Size

    88KB

  • Sample

    220823-ne94csgfe2

  • MD5

    46c67c120019075d0f2844d6ae5ca36b

  • SHA1

    2f5eaea257941502651d05b61f62f4d5034a80ae

  • SHA256

    8c7068ecf9168d899f1e67971f0f20b590ece3c4e60d45bc0a90100eb111868a

  • SHA512

    993fecdb07f1bb27cd7bf50623c935e764ced31727e7fcd73ce2de5a55c52115bb6b44316721f0bcc429de7a63ff73ab07a052c0c088d3723ff59ada75300dcb

  • SSDEEP

    1536:JxqjQ+P04wsmJCZkJ/ZVclN6PIeZtKDs4zb1NJcz:sr85CZ0zYAIeZtQrzb1C

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

p.webshare.io:80

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      8c7068ecf9168d899f1e67971f0f20b590ece3c4e60d45bc0a90100eb111868a

    • Size

      88KB

    • MD5

      46c67c120019075d0f2844d6ae5ca36b

    • SHA1

      2f5eaea257941502651d05b61f62f4d5034a80ae

    • SHA256

      8c7068ecf9168d899f1e67971f0f20b590ece3c4e60d45bc0a90100eb111868a

    • SHA512

      993fecdb07f1bb27cd7bf50623c935e764ced31727e7fcd73ce2de5a55c52115bb6b44316721f0bcc429de7a63ff73ab07a052c0c088d3723ff59ada75300dcb

    • SSDEEP

      1536:JxqjQ+P04wsmJCZkJ/ZVclN6PIeZtKDs4zb1NJcz:sr85CZ0zYAIeZtQrzb1C

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Async RAT payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks