General
-
Target
AsyncRAT-C-Sharp[1]
-
Size
327KB
-
Sample
240808-zfqa5ayhpp
-
MD5
fdaef1ee8df86d3be81635910117256b
-
SHA1
d543715b01923fbf601e23a87b7e3a4343a7f021
-
SHA256
258e07372cfe185797b6c044f17439e6e3f621dd31db32ba93d61af170361d43
-
SHA512
488a1f0fe23702ae07b033e79eed2170b90995f5cf39ba786d95fb2741cfbe2819272dbea9e93032203350fdb466db8244797d1224145b1110b40e23f25ab1ef
-
SSDEEP
6144:iSotL3uokeOvHS1d1+sNs8wbiWQo9JvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vo:FotL3uokeOvHS1d1+sNs8wbiWQo9JvZx
Static task
static1
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
M19GxaCXV2QE
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
AsyncRAT-C-Sharp[1]
-
Size
327KB
-
MD5
fdaef1ee8df86d3be81635910117256b
-
SHA1
d543715b01923fbf601e23a87b7e3a4343a7f021
-
SHA256
258e07372cfe185797b6c044f17439e6e3f621dd31db32ba93d61af170361d43
-
SHA512
488a1f0fe23702ae07b033e79eed2170b90995f5cf39ba786d95fb2741cfbe2819272dbea9e93032203350fdb466db8244797d1224145b1110b40e23f25ab1ef
-
SSDEEP
6144:iSotL3uokeOvHS1d1+sNs8wbiWQo9JvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vo:FotL3uokeOvHS1d1+sNs8wbiWQo9JvZx
-
Async RAT payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-