General

  • Target

    1a4366699c48a02df07c20bbaaa52cf3.exe

  • Size

    707KB

  • Sample

    230807-1mlrysba4s

  • MD5

    1a4366699c48a02df07c20bbaaa52cf3

  • SHA1

    7b33c126376835985af1cc58c6bf2f7db6620a1f

  • SHA256

    53f4fd902e35def1c2bf400b5b5be78a9915f7f80319a5ca2e01eb728dca4739

  • SHA512

    50d179a30c7f8bf81f953377616bc5e2b6d38f96da765f5ea96e12308de071d8ea8cf8f35019d20f00f0d5473a22100c38052dc7083abcd7486d8eb643f7a831

  • SSDEEP

    6144:rrVAN4YPx8qbssRQPatntAG35AKwVjWFP2NVpLSLZQLLLLLcLLLYLLLL6LLLiZLk:vhY8qbsM6qqVz920lZS5J

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

July 26

C2

donzola.duckdns.org:2000

Mutex

AsyncMutex_iuykt5yr5ur58n8tnur8herjncr8tk

Attributes
  • delay

    53

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1a4366699c48a02df07c20bbaaa52cf3.exe

    • Size

      707KB

    • MD5

      1a4366699c48a02df07c20bbaaa52cf3

    • SHA1

      7b33c126376835985af1cc58c6bf2f7db6620a1f

    • SHA256

      53f4fd902e35def1c2bf400b5b5be78a9915f7f80319a5ca2e01eb728dca4739

    • SHA512

      50d179a30c7f8bf81f953377616bc5e2b6d38f96da765f5ea96e12308de071d8ea8cf8f35019d20f00f0d5473a22100c38052dc7083abcd7486d8eb643f7a831

    • SSDEEP

      6144:rrVAN4YPx8qbssRQPatntAG35AKwVjWFP2NVpLSLZQLLLLLcLLLYLLLL6LLLiZLk:vhY8qbsM6qqVz920lZS5J

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks