General

  • Target

    kkkk.exe

  • Size

    47KB

  • Sample

    240816-rqwlwsyhrd

  • MD5

    1d7a26fbb453cc6d2e7d043b78e35a20

  • SHA1

    09f126416801d34bbb810f31177d85af47d7e6e3

  • SHA256

    828ba73d572808c7a5b1446c74aac88f12783993c77ced5f448a4d013d5af5ba

  • SHA512

    a5c7406b72a12c0e1fba41ab7860298c32c46316c614b7f6362006fa592ca014753211fee1075436080cb1ed08eaef43aefbb6e3d982827e4eed00f8954987ea

  • SSDEEP

    768:Juk0VT3ongoWU2Gjimo2qrZwC9VsFtePIpk6Z/0bCwAL48IESVGmitVzcWIVgCt1:Juk0VT3Q+2GVsFtpkOcbCwAIVjitVzcp

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:7707

127.0.0.1:8808

Mutex

O0LOqrCJA4pL

Attributes
  • delay

    3

  • install

    true

  • install_file

    hey.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      kkkk.exe

    • Size

      47KB

    • MD5

      1d7a26fbb453cc6d2e7d043b78e35a20

    • SHA1

      09f126416801d34bbb810f31177d85af47d7e6e3

    • SHA256

      828ba73d572808c7a5b1446c74aac88f12783993c77ced5f448a4d013d5af5ba

    • SHA512

      a5c7406b72a12c0e1fba41ab7860298c32c46316c614b7f6362006fa592ca014753211fee1075436080cb1ed08eaef43aefbb6e3d982827e4eed00f8954987ea

    • SSDEEP

      768:Juk0VT3ongoWU2Gjimo2qrZwC9VsFtePIpk6Z/0bCwAL48IESVGmitVzcWIVgCt1:Juk0VT3Q+2GVsFtpkOcbCwAIVjitVzcp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks