General

  • Target

    generator.exe

  • Size

    23.0MB

  • Sample

    231012-bjcx7seh2s

  • MD5

    2e11e2c532629a74cceb1b85e91d44b3

  • SHA1

    a7b785e31ce6228d66834b64b6ad6295c33dc5eb

  • SHA256

    0f8467fc257fde33ed91a4437303227c1ecbfeb6838b37c77d6a990819ea36da

  • SHA512

    9b53cb953aef1baf3e7bfef05e9a5ceaeb715b695dc8af5036cbe274f41bdfe85006f4d58e4f5e46ed1d37791e38ad1ed3de2c01814af2cce03684135228eb4b

  • SSDEEP

    393216:WFQtstvdqEr7M5liRdQJlEwF3MnG3otl53oaeqr5Ak1eDBTW3WTseO5J:EQtstVn7M5lkdQ13MGYNxyhBT15y

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

def

C2

37.18.62.18:8060

Mutex

era2312swe12-1213rsgdkms23

Attributes
  • delay

    1

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      generator.exe

    • Size

      23.0MB

    • MD5

      2e11e2c532629a74cceb1b85e91d44b3

    • SHA1

      a7b785e31ce6228d66834b64b6ad6295c33dc5eb

    • SHA256

      0f8467fc257fde33ed91a4437303227c1ecbfeb6838b37c77d6a990819ea36da

    • SHA512

      9b53cb953aef1baf3e7bfef05e9a5ceaeb715b695dc8af5036cbe274f41bdfe85006f4d58e4f5e46ed1d37791e38ad1ed3de2c01814af2cce03684135228eb4b

    • SSDEEP

      393216:WFQtstvdqEr7M5liRdQJlEwF3MnG3otl53oaeqr5Ak1eDBTW3WTseO5J:EQtstVn7M5lkdQ13MGYNxyhBT15y

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks