General

  • Target

    4643a65fbe48cb8d17b33aea46ffb8d33ae1e7497dcfffe1715cb93010abd4bf

  • Size

    2.0MB

  • Sample

    240818-xcqrda1fjm

  • MD5

    1ebc277fc5893971a3c010fe7cbf644f

  • SHA1

    8444279fee95bebfbf882134962a1afaa16f0b45

  • SHA256

    4643a65fbe48cb8d17b33aea46ffb8d33ae1e7497dcfffe1715cb93010abd4bf

  • SHA512

    86f0df5d10925440b6fc5ec9b0cc723f7babb6d8a04d93f9878ebcb3044ab1f40b07b2c54d659092088f870e331dffc69eea9aa2ddedd8cd27374320d46ecfd4

  • SSDEEP

    24576:qEjTWrDgjlTiiQud5Jg1zC+VfsPprIghtNZ26D2dXdsjdzglySX:sr0jZiiV5CtC4fsprltNZ26DKsRoX

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

allay.x3322.net:5050

Mutex

gnrfjlujxmukjuvrs

Attributes
  • delay

    1

  • install

    true

  • install_file

    WriteFile.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4643a65fbe48cb8d17b33aea46ffb8d33ae1e7497dcfffe1715cb93010abd4bf

    • Size

      2.0MB

    • MD5

      1ebc277fc5893971a3c010fe7cbf644f

    • SHA1

      8444279fee95bebfbf882134962a1afaa16f0b45

    • SHA256

      4643a65fbe48cb8d17b33aea46ffb8d33ae1e7497dcfffe1715cb93010abd4bf

    • SHA512

      86f0df5d10925440b6fc5ec9b0cc723f7babb6d8a04d93f9878ebcb3044ab1f40b07b2c54d659092088f870e331dffc69eea9aa2ddedd8cd27374320d46ecfd4

    • SSDEEP

      24576:qEjTWrDgjlTiiQud5Jg1zC+VfsPprIghtNZ26D2dXdsjdzglySX:sr0jZiiV5CtC4fsprltNZ26DKsRoX

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks