General

  • Target

    AsyncClient.exe

  • Size

    47KB

  • Sample

    240513-q8qypaac94

  • MD5

    a5394d7d38a3e45162457f120ae82d62

  • SHA1

    07c9fd54030fed1bc672c573049a65670a14ce01

  • SHA256

    a1117e97df6e8a615eb0dcacec3ae6476e11d66c4f080751d37286d0f4f8013e

  • SHA512

    0f49ce9848d79017ab2da707d1c841c8085001c115e9658ef47501bf75ef7746daebe92ea93f7f7681438d494717c8e0c12f6e05d46c5397b3b669d201e58887

  • SSDEEP

    768:XusZ1ThIn5PWUDvOtmo2qzVVLvEZof6SPIq7LATOk20bRcYEf+3od+ctMOZYBDZe:XusZ1Thsq2pZoqqoTnZbRclf+3ktMOZR

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6522

127.0.0.1:37915

de-engines.gl.at.ply.gg:6522

de-engines.gl.at.ply.gg:37915

these-accommodation.gl.at.ply.gg:6522

these-accommodation.gl.at.ply.gg:37915

Mutex

vmplgwKOt6xO

Attributes
  • delay

    3

  • install

    false

  • install_file

    Steam.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      47KB

    • MD5

      a5394d7d38a3e45162457f120ae82d62

    • SHA1

      07c9fd54030fed1bc672c573049a65670a14ce01

    • SHA256

      a1117e97df6e8a615eb0dcacec3ae6476e11d66c4f080751d37286d0f4f8013e

    • SHA512

      0f49ce9848d79017ab2da707d1c841c8085001c115e9658ef47501bf75ef7746daebe92ea93f7f7681438d494717c8e0c12f6e05d46c5397b3b669d201e58887

    • SSDEEP

      768:XusZ1ThIn5PWUDvOtmo2qzVVLvEZof6SPIq7LATOk20bRcYEf+3od+ctMOZYBDZe:XusZ1Thsq2pZoqqoTnZbRclf+3ktMOZR

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks