General

  • Target

    Bloody_Loader.bat

  • Size

    272KB

  • Sample

    240814-xat11ssejm

  • MD5

    7c0a3650dec50cf6ebebccbeefde89fc

  • SHA1

    066764d975297ccb6a4ad915e9f3a4757f739362

  • SHA256

    eb94ad681ca2acc14bd598c0fcefbc4c059e2de8f1ff2a93401bfdc56fbfb453

  • SHA512

    ec1656af327a5df43ef4765cc1221411ae5f402809b165b741ea4749110825f5724dfa0611286cc8f2ac401b9f9cb440dbdf359f826d3cbddbded987a5586635

  • SSDEEP

    6144:K4X36tiZ6MmwN5aQgSOzGhjWEop+/k1f+JcXB:9KwZQmcQgSO6hjFopwkp7

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Slave

C2

0.tcp.ngrok.io:19607

Mutex

DcRatMutex_UIHUIHUIGUvytyfIfUDytYTdyyDytdtyducyCw

Attributes
  • delay

    1

  • install

    true

  • install_file

    guiGUIgYFyufiuyIgogILGoW.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Bloody_Loader.bat

    • Size

      272KB

    • MD5

      7c0a3650dec50cf6ebebccbeefde89fc

    • SHA1

      066764d975297ccb6a4ad915e9f3a4757f739362

    • SHA256

      eb94ad681ca2acc14bd598c0fcefbc4c059e2de8f1ff2a93401bfdc56fbfb453

    • SHA512

      ec1656af327a5df43ef4765cc1221411ae5f402809b165b741ea4749110825f5724dfa0611286cc8f2ac401b9f9cb440dbdf359f826d3cbddbded987a5586635

    • SSDEEP

      6144:K4X36tiZ6MmwN5aQgSOzGhjWEop+/k1f+JcXB:9KwZQmcQgSO6hjFopwkp7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks