General

  • Target

    AsyncClient.exe

  • Size

    45KB

  • Sample

    240907-wd3a5aycrg

  • MD5

    5142671fa2d46cf8d77065acd3207c28

  • SHA1

    a5d95297afa5aa80be622d408f0c5177d66b4322

  • SHA256

    6705e4dbe804386d2bcee3bb9065feef12e8d16999aabf3fffa48e4b60ae7950

  • SHA512

    1abf6f9e52f131913be6f4472fe2ab52893ee4c27724ed7c41646517ba6936cc162931b674e468327792ac70673308cfc74b8fd86e1f8a25be34820c1e058ea4

  • SSDEEP

    768:du361TFMBX1WUVLGPmo2qj1KjPGaG6PIyzjbFgX3iOoWzPV4p71C6WBDZ3x:du361TFqG28KTkDy3bCXS8zOF1CBd3x

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

baltekbezmajtek.zapto.org:6606

baltekbezmajtek.zapto.org:7707

baltekbezmajtek.zapto.org:8808

baltekbezmajtek.zapto.org:1605

192.168.8.1:6606

192.168.8.1:7707

192.168.8.1:8808

192.168.8.1:1605

192.168.8.158:6606

192.168.8.158:7707

192.168.8.158:8808

192.168.8.158:1605

Mutex

CZu6WvgWISic

Attributes
  • delay

    3

  • install

    true

  • install_file

    WindowsUpdate.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

latentbot

C2

baltekbezmajtek.zapto.org

Targets

    • Target

      AsyncClient.exe

    • Size

      45KB

    • MD5

      5142671fa2d46cf8d77065acd3207c28

    • SHA1

      a5d95297afa5aa80be622d408f0c5177d66b4322

    • SHA256

      6705e4dbe804386d2bcee3bb9065feef12e8d16999aabf3fffa48e4b60ae7950

    • SHA512

      1abf6f9e52f131913be6f4472fe2ab52893ee4c27724ed7c41646517ba6936cc162931b674e468327792ac70673308cfc74b8fd86e1f8a25be34820c1e058ea4

    • SSDEEP

      768:du361TFMBX1WUVLGPmo2qj1KjPGaG6PIyzjbFgX3iOoWzPV4p71C6WBDZ3x:du361TFqG28KTkDy3bCXS8zOF1CBd3x

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks