General

  • Target

    2a53484075daf8f8b6e724f6ad4987d3f097370b8ee8dd9612207365667a9ab1

  • Size

    256KB

  • Sample

    221130-wlhaxscd44

  • MD5

    bf0cbeab3c925e5a771ed3ed411fab3b

  • SHA1

    d83838de4edc5a17df8b56b6a3ce4004d3b501b6

  • SHA256

    2a53484075daf8f8b6e724f6ad4987d3f097370b8ee8dd9612207365667a9ab1

  • SHA512

    f46907adb82310883e3eb70c275ab96c61359626f4e34bfb957fcbc7a863e2c4c501d85c788cd103f2d52e2dd707960b0000def781de24390db855fae40c7f28

  • SSDEEP

    3072:ciZtc8bFRHCreEUt8At30cwPU5giWkTalWr1UVtUp:cinbt8c30cwPAU/

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

dropout-35209.portmap.host:35209

dropout-35209.portmap.host:44444

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2a53484075daf8f8b6e724f6ad4987d3f097370b8ee8dd9612207365667a9ab1

    • Size

      256KB

    • MD5

      bf0cbeab3c925e5a771ed3ed411fab3b

    • SHA1

      d83838de4edc5a17df8b56b6a3ce4004d3b501b6

    • SHA256

      2a53484075daf8f8b6e724f6ad4987d3f097370b8ee8dd9612207365667a9ab1

    • SHA512

      f46907adb82310883e3eb70c275ab96c61359626f4e34bfb957fcbc7a863e2c4c501d85c788cd103f2d52e2dd707960b0000def781de24390db855fae40c7f28

    • SSDEEP

      3072:ciZtc8bFRHCreEUt8At30cwPU5giWkTalWr1UVtUp:cinbt8c30cwPAU/

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks