General

  • Target

    859e715607c56783ca86527dc6e6696d741030b10d9c17a911ddf933d6ebe4ac

  • Size

    1.9MB

  • Sample

    240818-xhzlgasajn

  • MD5

    15580dae4a38e0ee4581c1cb3b1d98eb

  • SHA1

    493a4b1a0207ea640efed703e4680ca4a73dfab9

  • SHA256

    859e715607c56783ca86527dc6e6696d741030b10d9c17a911ddf933d6ebe4ac

  • SHA512

    712a4ff9c0d401c757c162cf91094fc5e977e3183cce364415823fe78f44e83d0e128730f25d2fcfae3319148118c0512d4fbc5b6fd608a3677b957209132ebd

  • SSDEEP

    24576:SbgHrheVS3QUa4EbvAH8MeRaW8OF+91iYv4Y22cMUrRnZlRvdseSb1WS8b7zF61A:SOeQQr4EbvdQOQiYvku23rsZWS8b7ZX

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

allay.f3322.net:5050

Mutex

fgidvwdtbfcdtau

Attributes
  • delay

    1

  • install

    true

  • install_file

    WriteFile.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      859e715607c56783ca86527dc6e6696d741030b10d9c17a911ddf933d6ebe4ac

    • Size

      1.9MB

    • MD5

      15580dae4a38e0ee4581c1cb3b1d98eb

    • SHA1

      493a4b1a0207ea640efed703e4680ca4a73dfab9

    • SHA256

      859e715607c56783ca86527dc6e6696d741030b10d9c17a911ddf933d6ebe4ac

    • SHA512

      712a4ff9c0d401c757c162cf91094fc5e977e3183cce364415823fe78f44e83d0e128730f25d2fcfae3319148118c0512d4fbc5b6fd608a3677b957209132ebd

    • SSDEEP

      24576:SbgHrheVS3QUa4EbvAH8MeRaW8OF+91iYv4Y22cMUrRnZlRvdseSb1WS8b7zF61A:SOeQQr4EbvdQOQiYvku23rsZWS8b7ZX

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks