General

  • Target

    ddc7de0424a521ff4b0941a018df5351042bb5520aaac592cc9437fab79b713f

  • Size

    691KB

  • Sample

    240417-rgg25scf6z

  • MD5

    51e180271c1aa2cf90e9d923a14eee34

  • SHA1

    78d9c04f396e739321c5fc5fe67bc3b9715528d4

  • SHA256

    ddc7de0424a521ff4b0941a018df5351042bb5520aaac592cc9437fab79b713f

  • SHA512

    b80443ff60aa69c2dffc24bc5e3971da304d951ecb0c33fe5ce4edd26731cc015a274cc9e59537af09539a77998e199566f1103082251aa006d432f9aec5abe1

  • SSDEEP

    12288:21NdUzBb5U7iGHcvp6DV1RKpr3nE2NttXfTxfW57wg/r1+SZt4x8EOlq5Mqr:notH66nYpr3vtJ7BWGg/Z+SD4x8G5Mqr

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

CAFE

C2

armandocastillodominio.con-ip.com:4040

armandocastillodominio.con-ip.com:4041

Mutex

Cookies

Attributes
  • delay

    3

  • install

    false

  • install_file

    winu32.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      dcb648e233ea213fc93b4f4989a917b1e3b73dab596ae6adc1f6c44c0ab1e43d.exe

    • Size

      715KB

    • MD5

      50aa9353e6328b6ab45717d4c410adde

    • SHA1

      bb1949014c0d3a0930844a93a2bef1775126e23f

    • SHA256

      dcb648e233ea213fc93b4f4989a917b1e3b73dab596ae6adc1f6c44c0ab1e43d

    • SHA512

      592b24bb3b07218adfe73f33bc7ccf377ee22934ca63a4f79e956823eabfb287d643120fe6aa4071466453d429883348350b3fdee85cfc43a9b1df110cd66281

    • SSDEEP

      12288:TrB7dEl+et7UwYhQqwoiuIFSP7loB90pIJzubJ2QZWYxrRjsWSA97MqLS:TrB7dE8HgFIP7+9ci7f9Ee

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks