General

  • Target

    NEAS.e1c71fb426d67f4dfe2ed8637c131550_JC.exe

  • Size

    67KB

  • Sample

    231031-tpkjcaah7y

  • MD5

    e1c71fb426d67f4dfe2ed8637c131550

  • SHA1

    f0d5c7f1998878aae4bf0fcd929a350f63b8435d

  • SHA256

    451db4bfc67eba52fbaa4cef1f739f59d22dac026f7dc0197fdf319d83144bee

  • SHA512

    a8cc014984210bb851d1349a9892273861725c04aa828e6e245addfc24d131ac366ee0a47b1923059f5659cfcd65e5937c9fbb6c6d409ccb71827f07aba6f9fa

  • SSDEEP

    1536:qWO4LYFP6YCXB/rWMYq2eEec4YiKTMTSHVapPu4ZiYGCK+gIGc:Q4w6YkB/HVEvxiAHMxuYaRIGc

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

X4siGuXdWeZ3

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      NEAS.e1c71fb426d67f4dfe2ed8637c131550_JC.exe

    • Size

      67KB

    • MD5

      e1c71fb426d67f4dfe2ed8637c131550

    • SHA1

      f0d5c7f1998878aae4bf0fcd929a350f63b8435d

    • SHA256

      451db4bfc67eba52fbaa4cef1f739f59d22dac026f7dc0197fdf319d83144bee

    • SHA512

      a8cc014984210bb851d1349a9892273861725c04aa828e6e245addfc24d131ac366ee0a47b1923059f5659cfcd65e5937c9fbb6c6d409ccb71827f07aba6f9fa

    • SSDEEP

      1536:qWO4LYFP6YCXB/rWMYq2eEec4YiKTMTSHVapPu4ZiYGCK+gIGc:Q4w6YkB/HVEvxiAHMxuYaRIGc

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks