General

  • Target

    526ea33289356c0ed440ed74337e50e4fc6ce2dae41032cacd5e2a8228d657ed

  • Size

    10.0MB

  • Sample

    240829-g2egmszbkj

  • MD5

    98a06726419d6f57c0d9b0835522d920

  • SHA1

    cf0ec3810ef0f1e79d25b8e28ab04595ca7371dd

  • SHA256

    526ea33289356c0ed440ed74337e50e4fc6ce2dae41032cacd5e2a8228d657ed

  • SHA512

    a81d839cbb6614013f1e49b5430a4bde6369599f3545272877ee574b49975d37dbe7bb6ad893c4a91ed5bfce684454dcbda145b63fdea5d9e4379bba0196ea18

  • SSDEEP

    24576:LgavIUE8hYhJBZVrqMg/ngUsx6Er3v7Wm0DbxwLxvPjqT9Q0X7xxErhccu:LLvzhY3RrqMgoUkr3v7WvDbY1YQw2F

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

0000028-AGO

C2

rolandgarros.dynuddns.net:22207

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      526ea33289356c0ed440ed74337e50e4fc6ce2dae41032cacd5e2a8228d657ed

    • Size

      10.0MB

    • MD5

      98a06726419d6f57c0d9b0835522d920

    • SHA1

      cf0ec3810ef0f1e79d25b8e28ab04595ca7371dd

    • SHA256

      526ea33289356c0ed440ed74337e50e4fc6ce2dae41032cacd5e2a8228d657ed

    • SHA512

      a81d839cbb6614013f1e49b5430a4bde6369599f3545272877ee574b49975d37dbe7bb6ad893c4a91ed5bfce684454dcbda145b63fdea5d9e4379bba0196ea18

    • SSDEEP

      24576:LgavIUE8hYhJBZVrqMg/ngUsx6Er3v7Wm0DbxwLxvPjqT9Q0X7xxErhccu:LLvzhY3RrqMgoUkr3v7WvDbY1YQw2F

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks