General

  • Target

    test.exe

  • Size

    45KB

  • MD5

    fe77ff2f30db7deeb98c0aadc8899beb

  • SHA1

    e43fedc7ff7b8292dd5b472bba3ed01ab31fe019

  • SHA256

    0359e75824724f975304b0bdb5dccc00eae0f59c40a00c753ad86ae79363f7ea

  • SHA512

    fb483caaf76ce6ed651d04502544bccaea8a3e04387ed531c13e90953c80dff4ed61a3f1773ede878e4f932eee3a7fe0bdb650cb74078b4e23df20d18dd0d7ad

  • SSDEEP

    768:Eues1TYQZ3VWU1Dmhbvmo2qjC8V1vBTcPI1zjbkgX3iB1/1x4KuFs/L8zQ6etMdI:Eues1TYiwhN2P8VnTh13brXSB134d5sP

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

COM Surrogate

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:1604

127.0.0.1:14576

4.tcp.eu.ngrok.io:6606

4.tcp.eu.ngrok.io:7707

4.tcp.eu.ngrok.io:8808

4.tcp.eu.ngrok.io:1604

4.tcp.eu.ngrok.io:14576

Mutex

COM Surrogate

Attributes
  • delay

    3

  • install

    true

  • install_file

    Microsoft.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • test.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections