General

  • Target

    b3228db9bbc763295df17ec8c46d2a68bb6bba6f3300251ad0d90006b10cd979

  • Size

    2.8MB

  • Sample

    240818-xmag5syemd

  • MD5

    00487f368ca1e0b393b10864ac1c1acb

  • SHA1

    f608a84f0b0ee4b4bcf33525549214a9e0e04e15

  • SHA256

    b3228db9bbc763295df17ec8c46d2a68bb6bba6f3300251ad0d90006b10cd979

  • SHA512

    49d7583463e2a24d10f9625d1b9ea7b5c1246332d2f5c38471aae9522b67ef414fbf81bf74b4da5af1e83e23fb06fab67f823b657912a4359fdeaa5419e9a19f

  • SSDEEP

    49152:Z7StcEqQHLQ+d2jVuBxzHYT/eZiKsEXdXP:ktc1okLc7jxd/

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

allay.x3322.net:5050

Mutex

gnrfjlujxmukjuvrs

Attributes
  • delay

    1

  • install

    true

  • install_file

    WriteFile.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      b3228db9bbc763295df17ec8c46d2a68bb6bba6f3300251ad0d90006b10cd979

    • Size

      2.8MB

    • MD5

      00487f368ca1e0b393b10864ac1c1acb

    • SHA1

      f608a84f0b0ee4b4bcf33525549214a9e0e04e15

    • SHA256

      b3228db9bbc763295df17ec8c46d2a68bb6bba6f3300251ad0d90006b10cd979

    • SHA512

      49d7583463e2a24d10f9625d1b9ea7b5c1246332d2f5c38471aae9522b67ef414fbf81bf74b4da5af1e83e23fb06fab67f823b657912a4359fdeaa5419e9a19f

    • SSDEEP

      49152:Z7StcEqQHLQ+d2jVuBxzHYT/eZiKsEXdXP:ktc1okLc7jxd/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks