General

  • Target

    Dropper.exe

  • Size

    12KB

  • Sample

    240714-21fzaswfnk

  • MD5

    3c7266e1f13c9dd74dba9b7546601d01

  • SHA1

    71434fc2a94fd910820f6b8d7d9440a5c45b7ae0

  • SHA256

    5ab63870b80c8c0b2fb482f1c9581682740feac9ae7a5c0d8fd9b31997865330

  • SHA512

    3b71e65c0d815b6444c6f908af0015491147438977bcb795b318a07b3b78e1c4491cf21265b90c742fb5615a900256bb2e03cf2074993cec07f46dcd6ae111b2

  • SSDEEP

    384:t/kXUT2i7q9bJnz6PbQ4+FBCf3tmfhhD84VCsk:n2n9bJMbIytkhhDJwsk

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

environmental-blank.gl.at.ply.gg:25944

Attributes
  • delay

    1

  • install

    true

  • install_file

    $77-aachost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Dropper.exe

    • Size

      12KB

    • MD5

      3c7266e1f13c9dd74dba9b7546601d01

    • SHA1

      71434fc2a94fd910820f6b8d7d9440a5c45b7ae0

    • SHA256

      5ab63870b80c8c0b2fb482f1c9581682740feac9ae7a5c0d8fd9b31997865330

    • SHA512

      3b71e65c0d815b6444c6f908af0015491147438977bcb795b318a07b3b78e1c4491cf21265b90c742fb5615a900256bb2e03cf2074993cec07f46dcd6ae111b2

    • SSDEEP

      384:t/kXUT2i7q9bJnz6PbQ4+FBCf3tmfhhD84VCsk:n2n9bJMbIytkhhDJwsk

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks