General

  • Target

    2b953a27fe875c8394d05347a5d11d14.exe

  • Size

    109KB

  • Sample

    240517-sa1fksda56

  • MD5

    2b953a27fe875c8394d05347a5d11d14

  • SHA1

    c4976290e6ec103671e7709abbed1a92c7c9b0a2

  • SHA256

    502d5f5c411a1eeec35a874336b32d35502abb31afd202ad66bd9b2bc341307f

  • SHA512

    5e62c4f031a05d4b3d8bc21b65d9d784de8eb759e13fe4ca9069c1c3520a8b0dcca964e1e39a6c38267d488f46a9986beb2161468dc5bc4ad1ff7313485ddf6e

  • SSDEEP

    3072:Foiy0nuMAXQF6PIZEDlY+9TXxzQ+HsKWbmFq5:Foinzot84umF

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

0pe3F2LrSSkk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Fluxus Folder.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/qdzaTTaM

aes.plain

Targets

    • Target

      2b953a27fe875c8394d05347a5d11d14.exe

    • Size

      109KB

    • MD5

      2b953a27fe875c8394d05347a5d11d14

    • SHA1

      c4976290e6ec103671e7709abbed1a92c7c9b0a2

    • SHA256

      502d5f5c411a1eeec35a874336b32d35502abb31afd202ad66bd9b2bc341307f

    • SHA512

      5e62c4f031a05d4b3d8bc21b65d9d784de8eb759e13fe4ca9069c1c3520a8b0dcca964e1e39a6c38267d488f46a9986beb2161468dc5bc4ad1ff7313485ddf6e

    • SSDEEP

      3072:Foiy0nuMAXQF6PIZEDlY+9TXxzQ+HsKWbmFq5:Foinzot84umF

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks