General

  • Target

    amon.bat

  • Size

    233B

  • Sample

    240717-dkj41swdkg

  • MD5

    e08c5fd0d0f2db350f45ac603cd98f0d

  • SHA1

    0717076f2ca9fe2bd7a475877bd74b5ceac50694

  • SHA256

    a151b88a77f0918dfab6044ae42d9497306a4d886845cdecf20081c0cad2386c

  • SHA512

    2da1fb7ecf2d679b9e16cb0dac88085a5a2514aac6b19ccfad258b7f3db9b5bd26c0fb5fc93968e643b217ce3ebd2aa173ca7597ad43fd6b886df1e936b36dc3

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

stuff-data.gl.at.ply.gg:54296

Mutex

u81wDUVoFHib

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      amon.bat

    • Size

      233B

    • MD5

      e08c5fd0d0f2db350f45ac603cd98f0d

    • SHA1

      0717076f2ca9fe2bd7a475877bd74b5ceac50694

    • SHA256

      a151b88a77f0918dfab6044ae42d9497306a4d886845cdecf20081c0cad2386c

    • SHA512

      2da1fb7ecf2d679b9e16cb0dac88085a5a2514aac6b19ccfad258b7f3db9b5bd26c0fb5fc93968e643b217ce3ebd2aa173ca7597ad43fd6b886df1e936b36dc3

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks