General

  • Target

    48baaaec861c9c8e662adcce3b76190a70511790582d432a6e0333e23e5328f8

  • Size

    2.1MB

  • Sample

    240818-xczpaaxhqb

  • MD5

    64ad72f11bcef0388b910ccab8d053e4

  • SHA1

    0d6c655dd0f534478d53b9ff4eb4c610de5f637e

  • SHA256

    48baaaec861c9c8e662adcce3b76190a70511790582d432a6e0333e23e5328f8

  • SHA512

    0661ec84c8e931f74e96fb714e2d766d2180fa1ab2dde77983e8b5e079a137e4b2cfbb29189cf29f57428ed6aa51fee5b9e10d8b1e99eb6ca4cbe09c4860f27c

  • SSDEEP

    24576:kNoJSJI0HPE5phcFA38uo6QaTt2xPNr/yDnXvSaCn4pXdsjGzV1AUWW7:kNpI2PE5EFA3pgagxPN8Xa/Os6BR

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

allay.x3322.net:5050

Mutex

gnrfjlujxmukjuvrs

Attributes
  • delay

    1

  • install

    true

  • install_file

    WriteFile.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      48baaaec861c9c8e662adcce3b76190a70511790582d432a6e0333e23e5328f8

    • Size

      2.1MB

    • MD5

      64ad72f11bcef0388b910ccab8d053e4

    • SHA1

      0d6c655dd0f534478d53b9ff4eb4c610de5f637e

    • SHA256

      48baaaec861c9c8e662adcce3b76190a70511790582d432a6e0333e23e5328f8

    • SHA512

      0661ec84c8e931f74e96fb714e2d766d2180fa1ab2dde77983e8b5e079a137e4b2cfbb29189cf29f57428ed6aa51fee5b9e10d8b1e99eb6ca4cbe09c4860f27c

    • SSDEEP

      24576:kNoJSJI0HPE5phcFA38uo6QaTt2xPNr/yDnXvSaCn4pXdsjGzV1AUWW7:kNpI2PE5EFA3pgagxPN8Xa/Os6BR

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks