General

  • Target

    4d3ab3271b4b755734734bdb45e64627d4c698bb709915bb9385eb3238dd1903

  • Size

    102KB

  • Sample

    221107-xrvnwafehl

  • MD5

    24bd42b57ca59e260369b704bcf1d17b

  • SHA1

    08cd3b748ec9fd2833a7f12019b4c618ee0185ef

  • SHA256

    4d3ab3271b4b755734734bdb45e64627d4c698bb709915bb9385eb3238dd1903

  • SHA512

    cdeb2a8e312d5fa0cb4be357882e6a21ccd2f5511b4096f2d6f825ffbfbbaa14b4cd442f5e056633375678ae8bf0b38e1224cfaadaa3d4dc06a0a30cb1316e88

  • SSDEEP

    1536:nFOxEuXFhkWFUnWJRuc3LAdswUUVE2uHmjFFzvOcHyg/bMO6X:nFOx1XfSWJvLA2w5VndBFqcHyg/bMr

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

FileManager

C2

20.107.115.162:50239

Mutex

FileManager

Attributes
  • delay

    3

  • install

    false

  • install_file

    FileManager

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4d3ab3271b4b755734734bdb45e64627d4c698bb709915bb9385eb3238dd1903

    • Size

      102KB

    • MD5

      24bd42b57ca59e260369b704bcf1d17b

    • SHA1

      08cd3b748ec9fd2833a7f12019b4c618ee0185ef

    • SHA256

      4d3ab3271b4b755734734bdb45e64627d4c698bb709915bb9385eb3238dd1903

    • SHA512

      cdeb2a8e312d5fa0cb4be357882e6a21ccd2f5511b4096f2d6f825ffbfbbaa14b4cd442f5e056633375678ae8bf0b38e1224cfaadaa3d4dc06a0a30cb1316e88

    • SSDEEP

      1536:nFOxEuXFhkWFUnWJRuc3LAdswUUVE2uHmjFFzvOcHyg/bMO6X:nFOx1XfSWJvLA2w5VndBFqcHyg/bMr

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks