General

  • Target

    5924b6d7b4e0c0ca7b9154ceea866ecddbfdf8dfcbf53d9fa1dc4da5920eaad9

  • Size

    418KB

  • Sample

    240417-qbgzhsge68

  • MD5

    69c351ed20fac872a174842a9b6cb1dd

  • SHA1

    d088472d69a20e8d27db484d83d45c5fed76c347

  • SHA256

    5924b6d7b4e0c0ca7b9154ceea866ecddbfdf8dfcbf53d9fa1dc4da5920eaad9

  • SHA512

    563fc431a1a03fac204ce2a6357dcf06028f912b1fcf68941595ede839ce714010d8d7edbd4197916c0e27024026a815684b73551ea2f303380b118f99bf1318

  • SSDEEP

    12288:uEU6IBjmBFbwII41ckgj2Gh2m9SWtiXr0MGwrM:i6PbwZEgj2GHyXrLU

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

194.147.140.157:3361

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    msdtc.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe

    • Size

      450KB

    • MD5

      ead981cd98146fabe078992943b0329d

    • SHA1

      a20ba9450187e13e3ed62e6beab4d2bec788df01

    • SHA256

      fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e

    • SHA512

      a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a

    • SSDEEP

      12288:FZcdIu1fgsDbqonwXKI9SrWLcsz8tEaay4MF3kR:FHumsct9SaLcPtaEFi

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks