General

  • Target

    59e4212b84a36744e19bf788f29ad35fec361b80bc92468f9b658346cf1532a6

  • Size

    2.2MB

  • Sample

    240514-nre4raeb78

  • MD5

    027866e4d4d7411f588991ecb31e98b4

  • SHA1

    24d25e65d124ca369baae0246109ccaca0eab5ba

  • SHA256

    59e4212b84a36744e19bf788f29ad35fec361b80bc92468f9b658346cf1532a6

  • SHA512

    bac543df234f0e20dfb3f71594c55365333222c3594fe12cd0c0178b5ac9c4cdd96170c0bb569108f53b8316f2af1bf96b939f285423b41023b7f492a37297ee

  • SSDEEP

    49152:tXcTEXpwNexYMzZf47a80FH2g4hQOlDI292re9nseWQI:tXcGlxrZf4u8Jnh2CnsUI

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

5512.sytes.net:6606

5512.sytes.net:7707

5512.sytes.net:8808

95.211.208.153:6606

95.211.208.153:7707

95.211.208.153:8808

Mutex

Llg9a02PERRO

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      369be61aca46750085c842147909f80c8f938555071adeaceac6727bfcf74186.exe

    • Size

      2.3MB

    • MD5

      a717a432c558f56c46709d6d3ec9837f

    • SHA1

      ceda052be2519383085089a41c422ce2b1400a46

    • SHA256

      369be61aca46750085c842147909f80c8f938555071adeaceac6727bfcf74186

    • SHA512

      e859810a198b8b946581ed6197b1154856e736687dd593d383dc952a3afd597ed6b5a631a8e6b2228a425b809b772457e6e10e0ca6f68cd8f0a8cc637a81132c

    • SSDEEP

      49152:T+GJaXbo4IKA2WN4M63n4dHzCJYU6Mm4/4w2RAObR8XlZrzyiko:TboxWN4UHzCJYCmX5w1ZXyik

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks