General

  • Target

    0486a402a26990b8173dbe65e26fc129c4cac2d3ea28c430c816fedfd70bd33e

  • Size

    418KB

  • Sample

    240417-pj7dpsee92

  • MD5

    ef4deb551a90bea0288ddf046df5532f

  • SHA1

    fc4a037992211f7b213a0e4882d4b508daea1953

  • SHA256

    0486a402a26990b8173dbe65e26fc129c4cac2d3ea28c430c816fedfd70bd33e

  • SHA512

    1d4277dd09c89d16d5987f034f582eab5604925e1e88bca6eab72b3a2d6880070008085a239008efcc017aec9d6813549c42f9143b79d099f2986d6190c3e2be

  • SSDEEP

    12288:2a9nD6sL7YoX1eOtzNTPaVS3dGyNKqMxnyNpk+:xRDnL7YoX1eYVPaV9DxyNm+

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

194.147.140.157:3361

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    msdtc.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe

    • Size

      450KB

    • MD5

      ead981cd98146fabe078992943b0329d

    • SHA1

      a20ba9450187e13e3ed62e6beab4d2bec788df01

    • SHA256

      fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e

    • SHA512

      a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a

    • SSDEEP

      12288:FZcdIu1fgsDbqonwXKI9SrWLcsz8tEaay4MF3kR:FHumsct9SaLcPtaEFi

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks