General

  • Target

    eaefab85173db758f3edc26c1089d291

  • Size

    63KB

  • Sample

    221128-3vlg9scd42

  • MD5

    eaefab85173db758f3edc26c1089d291

  • SHA1

    4ddaea6c4d83ff76d5ed484828639834178593b6

  • SHA256

    38cfc7d094c7065054393c7695327ce33a1698defade6edb072a5b56cdd4dd6f

  • SHA512

    52381c368ea49f33020e48cb9e5574a72ff86af0a72b087a35148d08b12fcabb835f68c98c8d4b567639d3675b5d0d1303a4bc8b802b6b2d14454397f2a678cd

  • SSDEEP

    1536:mJ1XXlloMdexiOzsqamqxGbb2wC2MzJGSDpqKmY7:mJ1XXlloMdeFzsqaHGbb2T2W5gz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

BitFlyer-New

C2

operador.ddns.me:4448

Mutex

Bit_Flyer_Bit_Flyer_Sec_Mod

Attributes
  • delay

    1

  • install

    true

  • install_file

    Chrome.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      eaefab85173db758f3edc26c1089d291

    • Size

      63KB

    • MD5

      eaefab85173db758f3edc26c1089d291

    • SHA1

      4ddaea6c4d83ff76d5ed484828639834178593b6

    • SHA256

      38cfc7d094c7065054393c7695327ce33a1698defade6edb072a5b56cdd4dd6f

    • SHA512

      52381c368ea49f33020e48cb9e5574a72ff86af0a72b087a35148d08b12fcabb835f68c98c8d4b567639d3675b5d0d1303a4bc8b802b6b2d14454397f2a678cd

    • SSDEEP

      1536:mJ1XXlloMdexiOzsqamqxGbb2wC2MzJGSDpqKmY7:mJ1XXlloMdeFzsqaHGbb2T2W5gz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks