General

  • Target

    62c74397f8072386701d0335cd743b31_JaffaCakes118

  • Size

    377KB

  • Sample

    240722-l2hlhs1eqa

  • MD5

    62c74397f8072386701d0335cd743b31

  • SHA1

    5b943b5663f46a4f657d3b96b19adb58b4cb6e0d

  • SHA256

    2aff770fe1841fccf58566e3fd9548ce18d13cf7d74cda8b938bafa90bfa23ea

  • SHA512

    28c0d0929956b1e328056f41d0133e0cd8d831a6b199f4f4439733be9f9743bf231276109a171e0d47e31a0407d734ee1eab5b4b7b4827dbcd6f6ed6133c950f

  • SSDEEP

    6144:Y/tEJ+O1eZFwamfVYPQTuZkB8zwHoeAjrOXF7rSHYNIZul7heHoqDkccx7vS0:Y2ut6V7GDvfqV7OHYNIk7ho/ivR

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

45.137.22.115:14496

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    20

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      SOA_SEPT.exe

    • Size

      492KB

    • MD5

      59921d02db3b8cdb6a293cfc4ba0acf1

    • SHA1

      ba2db3254521f8b0840c04606433d88ec431e030

    • SHA256

      8d87c0f9ca64bba08ba818b6910ca84623ac53931aa0f00d0b85367990e0c11d

    • SHA512

      6ec6bd6fcf06ad8606899424d9e9b00caa9c6810b8dd40a185ea29631b1804c4847551610e151cb87c9c1bd09a9f05c7ea15fae402cae2c5eb81cad17291d404

    • SSDEEP

      12288:FI5I046Mnq0UnsO5lJkKzUvoPUu9Y/Ba7yt8+BnLtMLwadEzb:gUBa7T+BnLtMLXd

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks