General

  • Target

    40c89ba2c4705e0bc78906c2c67a216ce2c8f35db71f9266bb22f951916f9f1c

  • Size

    2.5MB

  • Sample

    240719-1c53va1bkr

  • MD5

    ddc97a7ab7dbd853124e0696d3e176ee

  • SHA1

    2dc39aee3542996b092e878d1a249a1dea7e4792

  • SHA256

    40c89ba2c4705e0bc78906c2c67a216ce2c8f35db71f9266bb22f951916f9f1c

  • SHA512

    7455737c332f41d89e29f63e7d4f0c760d73ef4eaf80858e61cec4ffb35746d9db2c452c835815d76f2339fb31d37c65b61e8bc78967ebe9d326b491eba1e807

  • SSDEEP

    49152:UBgeYGOb5t6Wdn89Pu90RzQJmkmresvidKERc52O4/HGayYwJHh0CCwcL:UBgfG2t6Wd89WaMtGendKERc52BvGeGg

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

ENVIOJULIO

C2

hiperconection.duckdns.org:3030

Mutex

PRMBSRGT0kqWhLMuk3qtRg

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      simas.exe

    • Size

      633.6MB

    • MD5

      50d8f8e2fffcb5d00f53c2e2bced7264

    • SHA1

      2bbabd5d67e2eee8c129e1c686ffb26cc02bd7a9

    • SHA256

      f3c6e0e66df7c335f28b0db0a15c8e77986a1d0a57ffda99b787a6aaa03b8041

    • SHA512

      f483464810fafc54c7c9630be92e8e830fe082e6a32ff4ffd27bb00c8fa39ce508c5f8e4aa2a69fc6995223d43206dc0386091050c0916a24a342bccd3fc0eb9

    • SSDEEP

      98304:5mJVD97VAOltrWJP8SDUTYAA56RoeXN3cJvPd4Fm0fA0:5mJ7hAatrWJP8S+YAfSkN+vPjt0

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks