General
-
Target
amon.bat
-
Size
233B
-
Sample
240717-dkj41swdkg
-
MD5
e08c5fd0d0f2db350f45ac603cd98f0d
-
SHA1
0717076f2ca9fe2bd7a475877bd74b5ceac50694
-
SHA256
a151b88a77f0918dfab6044ae42d9497306a4d886845cdecf20081c0cad2386c
-
SHA512
2da1fb7ecf2d679b9e16cb0dac88085a5a2514aac6b19ccfad258b7f3db9b5bd26c0fb5fc93968e643b217ce3ebd2aa173ca7597ad43fd6b886df1e936b36dc3
Static task
static1
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
stuff-data.gl.at.ply.gg:54296
Mutex
u81wDUVoFHib
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
amon.bat
-
Size
233B
-
MD5
e08c5fd0d0f2db350f45ac603cd98f0d
-
SHA1
0717076f2ca9fe2bd7a475877bd74b5ceac50694
-
SHA256
a151b88a77f0918dfab6044ae42d9497306a4d886845cdecf20081c0cad2386c
-
SHA512
2da1fb7ecf2d679b9e16cb0dac88085a5a2514aac6b19ccfad258b7f3db9b5bd26c0fb5fc93968e643b217ce3ebd2aa173ca7597ad43fd6b886df1e936b36dc3
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-