General

  • Target

    38acb0a39a41cd025106836edc40beaa0b53cea2b7e5a3dcfebae8269b8f6c58

  • Size

    189KB

  • Sample

    221207-nnbbdsce58

  • MD5

    98379a4b4b9f36794e4d85eedf2ccf8e

  • SHA1

    7eabd6cf8bc2deecc6691c810146345f918213b9

  • SHA256

    38acb0a39a41cd025106836edc40beaa0b53cea2b7e5a3dcfebae8269b8f6c58

  • SHA512

    a5cceb8514f598f759e0dd9ba242fbbb7b029446d7d94f13b089da472dc8af52ec6014848b851bad67fe3ed268bb79db05284291e33e0bcdab58c2e05acdc63c

  • SSDEEP

    3072:B3CX/huQkPjdYZ2kPTx6A9duTSzac6gEzGP7y3mw9mKlrqNPVJFUSo7c1Vwi:B0YQIiZJPT4RUAgvP7yVmKl+NPVJFUSw

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

chinasea.duckdns.org:5201

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      38acb0a39a41cd025106836edc40beaa0b53cea2b7e5a3dcfebae8269b8f6c58

    • Size

      189KB

    • MD5

      98379a4b4b9f36794e4d85eedf2ccf8e

    • SHA1

      7eabd6cf8bc2deecc6691c810146345f918213b9

    • SHA256

      38acb0a39a41cd025106836edc40beaa0b53cea2b7e5a3dcfebae8269b8f6c58

    • SHA512

      a5cceb8514f598f759e0dd9ba242fbbb7b029446d7d94f13b089da472dc8af52ec6014848b851bad67fe3ed268bb79db05284291e33e0bcdab58c2e05acdc63c

    • SSDEEP

      3072:B3CX/huQkPjdYZ2kPTx6A9duTSzac6gEzGP7y3mw9mKlrqNPVJFUSo7c1Vwi:B0YQIiZJPT4RUAgvP7yVmKl+NPVJFUSw

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks