General

  • Target

    e26e685d51988b2ae00c8e7a4ef256db.bin

  • Size

    248KB

  • Sample

    230519-cgkeyaee73

  • MD5

    3947496ac0e4b08ce0a33e8e02b3650f

  • SHA1

    abcfbdd917b0af3165ce2b8f8ca09a5d2a5ff492

  • SHA256

    d9a4a7bcebc50f97043b547d0f9d390ca35888b9e9036f35a6e7593ffc71f5eb

  • SHA512

    15faf91cf9cfca2e89787868610f4128bf5d1e74f45f19eedc2fd67fb60d7c1d4fa237c074bb375619f632469d3e4ed16eb119937088c1fb0aa44de4aef7758b

  • SSDEEP

    3072:DQl8IPonacOa6Ai2NQ39XMcJkUmTxGGHhEZ00iHXFI2nERcg3j7fNV8V1RQpUol+:DXa+6AZQ3ZdtmT8GD0mic4jkHRzKeCEd

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

May_1

C2

3llah23.run.place:8808

Mutex

AsyncMutex_6SI850OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd.ps1

    • Size

      689KB

    • MD5

      e26e685d51988b2ae00c8e7a4ef256db

    • SHA1

      ba09428d9fdaadcd92a578d12a48dcb61d331856

    • SHA256

      fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd

    • SHA512

      dc362252519f2637577e4b6fa3bc7df69cfa937fe9eaa78d078bfd24d4ea5b887f90319d1ae918b10c3ec081bcb35a7d436a173cae712d4d6e2f4f8f8af65eef

    • SSDEEP

      1536:or/BsVwGJ9iOowdWIa/aEgRJWb+pifHNutiQ3JlqmbNNnLRS2EFurYdq7PbAeVh/:N

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Async RAT payload

    • Registers COM server for autorun

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks