General

  • Target

    7dd59e401ddd74587eec4fc88a3e20e8e056d6adeed8d904d17e00195741d6f0

  • Size

    418KB

  • Sample

    240417-p7p5bsgc39

  • MD5

    b315ef650eff657570cbd8f88ccd00c2

  • SHA1

    df644fd31509d7e33b93b5c266d4e160cc3ea963

  • SHA256

    7dd59e401ddd74587eec4fc88a3e20e8e056d6adeed8d904d17e00195741d6f0

  • SHA512

    3a4034d260da61cc8b9401feaca6788edd8c5e098f819af87e243e0b561694763686aea4402a300fc229aba744e49de75b622391a2b7f89d5fa25309b3305df5

  • SSDEEP

    12288:9+xJJcEL7AkD9O9Ct5ui73vT31WUi5+3H1PDNhjKZEXs7:GZL4i5uIvTb3Jrs7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

194.147.140.157:3361

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    msdtc.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe

    • Size

      450KB

    • MD5

      ead981cd98146fabe078992943b0329d

    • SHA1

      a20ba9450187e13e3ed62e6beab4d2bec788df01

    • SHA256

      fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e

    • SHA512

      a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a

    • SSDEEP

      12288:FZcdIu1fgsDbqonwXKI9SrWLcsz8tEaay4MF3kR:FHumsct9SaLcPtaEFi

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks