General

  • Target

    Infected.exe

  • Size

    63KB

  • Sample

    240309-smfxpsbe5v

  • MD5

    443b908a688cd9711ab170c7e1bdcd2d

  • SHA1

    96e01bad85aa895efed414816c7c4dc8245f6b6a

  • SHA256

    29a0503e608a845fad2c2944d905d90b0aba722433976f926fee99b1f92703c7

  • SHA512

    4b9a47a1fbeda77f7d3b53f7cc6e88ab02789ae52e5b07dd5eb10657c1509a02ceae2ee587422b7c36a03bd8a90f7e4067fba4a21604b40b38994c1ded48e12a

  • SSDEEP

    768:fDILAFjT678p4C8A+XeuazcBRL5JTk1+T4KSBGHmDbD/ph0oXSaB8eSuAdpqKYhg:kqTQJdSJYUbdh9PcuAdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

test

C2

fl-survivor.gl.at.ply.gg:23531

Mutex

تtΘΓiTΖn吾tEceX8nrqTT开NsΔ

Attributes
  • delay

    1

  • install

    true

  • install_file

    sigma.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Infected.exe

    • Size

      63KB

    • MD5

      443b908a688cd9711ab170c7e1bdcd2d

    • SHA1

      96e01bad85aa895efed414816c7c4dc8245f6b6a

    • SHA256

      29a0503e608a845fad2c2944d905d90b0aba722433976f926fee99b1f92703c7

    • SHA512

      4b9a47a1fbeda77f7d3b53f7cc6e88ab02789ae52e5b07dd5eb10657c1509a02ceae2ee587422b7c36a03bd8a90f7e4067fba4a21604b40b38994c1ded48e12a

    • SSDEEP

      768:fDILAFjT678p4C8A+XeuazcBRL5JTk1+T4KSBGHmDbD/ph0oXSaB8eSuAdpqKYhg:kqTQJdSJYUbdh9PcuAdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks