General

  • Target

    2fed2e02c8e90c9265319f5d7bd573f68fd0b1f21c1ed97fa1695b51e45c2636N

  • Size

    63KB

  • Sample

    240930-xjx42azfqp

  • MD5

    9a553625e7bb4c85c51ef01ed4caf1e0

  • SHA1

    3292c82975cea5051dd3f0e371491fade23d5fa4

  • SHA256

    2fed2e02c8e90c9265319f5d7bd573f68fd0b1f21c1ed97fa1695b51e45c2636

  • SHA512

    1eb2feff3b8443b499d6e19a02d958ffceea7ef70e283f40fdf812fddfcf633c3ab2b0576cec3a451135f529f807b14d7b2f10a7a42840e4e78d4b237e7223d7

  • SSDEEP

    768:Cuw6LVcsTPq781wC8A+XjuazcBRL5JTk1+T4KSBGHmDbD/ph0oX52lSuEdpqKYhg:LeQPckdSJYUbdh91uEdpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

electronics-fear.gl.at.ply.gg:56358

Attributes
  • delay

    1

  • install

    true

  • install_file

    dllhost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2fed2e02c8e90c9265319f5d7bd573f68fd0b1f21c1ed97fa1695b51e45c2636N

    • Size

      63KB

    • MD5

      9a553625e7bb4c85c51ef01ed4caf1e0

    • SHA1

      3292c82975cea5051dd3f0e371491fade23d5fa4

    • SHA256

      2fed2e02c8e90c9265319f5d7bd573f68fd0b1f21c1ed97fa1695b51e45c2636

    • SHA512

      1eb2feff3b8443b499d6e19a02d958ffceea7ef70e283f40fdf812fddfcf633c3ab2b0576cec3a451135f529f807b14d7b2f10a7a42840e4e78d4b237e7223d7

    • SSDEEP

      768:Cuw6LVcsTPq781wC8A+XjuazcBRL5JTk1+T4KSBGHmDbD/ph0oX52lSuEdpqKYhg:LeQPckdSJYUbdh91uEdpqKmY7

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks