General

  • Target

    cb24b1e0dddf2c96e3d11b056356344350bee2e73717a03aa64ff603c1b96806

  • Size

    2.1MB

  • Sample

    240818-xpxqfsyfph

  • MD5

    164e4c5b332cc56cfa830ceb3bb0cc69

  • SHA1

    627ca05636c752d15986a0eeb19b1f12eff4ead8

  • SHA256

    cb24b1e0dddf2c96e3d11b056356344350bee2e73717a03aa64ff603c1b96806

  • SHA512

    df9a8d559f4f3c63f05a0f1b71079f32035edda1add1374bfd9a4a89da4595e9924c320a1024caf92c71e36916ced33d386dc6a2d35482aef2bef358f5c4d828

  • SSDEEP

    24576:zywAui1af0bYBuu82xlkaNx933hRxYjzI8TZj7AoUs9/ZrUGyKT6rDrv3gQKsIs0:tHn0xaNxV3hnkI4Rj4g6cLsyOcsQg/P+

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

allay.x3322.net:5050

Mutex

gnrfjlujxmukjuvrs

Attributes
  • delay

    1

  • install

    true

  • install_file

    WriteFile.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      cb24b1e0dddf2c96e3d11b056356344350bee2e73717a03aa64ff603c1b96806

    • Size

      2.1MB

    • MD5

      164e4c5b332cc56cfa830ceb3bb0cc69

    • SHA1

      627ca05636c752d15986a0eeb19b1f12eff4ead8

    • SHA256

      cb24b1e0dddf2c96e3d11b056356344350bee2e73717a03aa64ff603c1b96806

    • SHA512

      df9a8d559f4f3c63f05a0f1b71079f32035edda1add1374bfd9a4a89da4595e9924c320a1024caf92c71e36916ced33d386dc6a2d35482aef2bef358f5c4d828

    • SSDEEP

      24576:zywAui1af0bYBuu82xlkaNx933hRxYjzI8TZj7AoUs9/ZrUGyKT6rDrv3gQKsIs0:tHn0xaNxV3hnkI4Rj4g6cLsyOcsQg/P+

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks