General

  • Target

    46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

  • Size

    89KB

  • Sample

    240421-pvtlzsbf53

  • MD5

    12de70d06ed65680914d061347ac1f95

  • SHA1

    14023e1ed46236cbfb463ddccd6345caa3c14d54

  • SHA256

    46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

  • SHA512

    7d6a20b0e9d6c5db0177e08f197f7858aa8000097c5eb2fa7a2b3d2181fefb53760efacd7fcba32d481193eee547162ac22b08b8e8777b68fc1597dec12db67f

  • SSDEEP

    1536:EGjb5BKhaUxo6TRMinLvIbzV6A2SYzEOV4c7rei1:EGjb5IJxZTLnL4aSY4OVDui

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

103.249.112.118:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

phemedrone

C2

http://77.221.151.42/dashboard/gate.php

Targets

    • Target

      46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

    • Size

      89KB

    • MD5

      12de70d06ed65680914d061347ac1f95

    • SHA1

      14023e1ed46236cbfb463ddccd6345caa3c14d54

    • SHA256

      46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

    • SHA512

      7d6a20b0e9d6c5db0177e08f197f7858aa8000097c5eb2fa7a2b3d2181fefb53760efacd7fcba32d481193eee547162ac22b08b8e8777b68fc1597dec12db67f

    • SSDEEP

      1536:EGjb5BKhaUxo6TRMinLvIbzV6A2SYzEOV4c7rei1:EGjb5IJxZTLnL4aSY4OVDui

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Phemedrone

      An information and wallet stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Downloads MZ/PE file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks