General

  • Target

    15ec1422db74fb41b7d086c608055aa1c3f9bb15fd5c3bfb40412f03d3eba565

  • Size

    160KB

  • Sample

    221207-nnbbdsff9x

  • MD5

    d32f06aa276a1ef87396ca0692f74214

  • SHA1

    60f910d6a81e4978a803ad6e5388afb21a435a9a

  • SHA256

    15ec1422db74fb41b7d086c608055aa1c3f9bb15fd5c3bfb40412f03d3eba565

  • SHA512

    e8b07c4321c1173d5d9ea591bd4ac59047a77843439c59b841ffc92657074ad1a12f4fc0aa9098e514777356c31d57f1fb124effc6f6b8505c5153ea48bae4f7

  • SSDEEP

    3072:p9ywHtYCIHfecjxrW4l248V3FMrF4MdFU0ohs8:NHtYjfrCVdKrLTU0o

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

chinasea.duckdns.org:5201

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      15ec1422db74fb41b7d086c608055aa1c3f9bb15fd5c3bfb40412f03d3eba565

    • Size

      160KB

    • MD5

      d32f06aa276a1ef87396ca0692f74214

    • SHA1

      60f910d6a81e4978a803ad6e5388afb21a435a9a

    • SHA256

      15ec1422db74fb41b7d086c608055aa1c3f9bb15fd5c3bfb40412f03d3eba565

    • SHA512

      e8b07c4321c1173d5d9ea591bd4ac59047a77843439c59b841ffc92657074ad1a12f4fc0aa9098e514777356c31d57f1fb124effc6f6b8505c5153ea48bae4f7

    • SSDEEP

      3072:p9ywHtYCIHfecjxrW4l248V3FMrF4MdFU0ohs8:NHtYjfrCVdKrLTU0o

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks