General

  • Target

    Infected - Copy.exe

  • Size

    63KB

  • Sample

    240417-cezf3scb6v

  • MD5

    2c40ce53a2c2805462f0be056ed82d58

  • SHA1

    400fe214fa8ddbb9745bfe293678c4d41c234cad

  • SHA256

    a2f0e4af244f31133cf9a0d50e643e5989792a5b77af1284b94f91f68d318ea7

  • SHA512

    d105d7b237c938b52edab95c62ea72c5fb2b81cd8746a27bc7738da5c98418dbf836431f5c166eeec16c836dc8a3e5535d2db1cdb2e11c30bf7aa5d6a7629bda

  • SSDEEP

    768:VFVsjkUAON78iHC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXw6xo4JISuDdpqM:VwAOJ9dSJYUbdh9TBuDdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:23638

147.185.221.19:23638

teen-modes.gl.at.ply.gg:23638

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Infected - Copy.exe

    • Size

      63KB

    • MD5

      2c40ce53a2c2805462f0be056ed82d58

    • SHA1

      400fe214fa8ddbb9745bfe293678c4d41c234cad

    • SHA256

      a2f0e4af244f31133cf9a0d50e643e5989792a5b77af1284b94f91f68d318ea7

    • SHA512

      d105d7b237c938b52edab95c62ea72c5fb2b81cd8746a27bc7738da5c98418dbf836431f5c166eeec16c836dc8a3e5535d2db1cdb2e11c30bf7aa5d6a7629bda

    • SSDEEP

      768:VFVsjkUAON78iHC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXw6xo4JISuDdpqM:VwAOJ9dSJYUbdh9TBuDdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Renames multiple (914) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

MITRE ATT&CK Matrix

Tasks