General

  • Target

    27995188901b199243be270c69f32511_JaffaCakes118

  • Size

    74KB

  • Sample

    241009-alxvqawhnd

  • MD5

    27995188901b199243be270c69f32511

  • SHA1

    c7409c4bae6f03ea8aca14e5c451cebb27724ed0

  • SHA256

    6f194457591e38ef91c704ee2e78d676158721b7123c5d6f1f7ab893525c1d0f

  • SHA512

    0c263a3401c4033de5383b33c2b10ae36fa1491658ef1278d98f39d68eb2ed421e2253fe374aca3e5691da489d09682adcb19587d679981d1e81ccfc0d1736e7

  • SSDEEP

    1536:0ItYxDHck2fKhIFcPKI3K/jzH3ZhWzoqxXKz1h:0I+xzfJ13yzpYzxx65h

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

rqwonderworld.ddns.net:6606

rqwonderworld.ddns.net:4782

Mutex

55

Attributes
  • delay

    3

  • install

    false

  • install_file

    WindowsCacher.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      27995188901b199243be270c69f32511_JaffaCakes118

    • Size

      74KB

    • MD5

      27995188901b199243be270c69f32511

    • SHA1

      c7409c4bae6f03ea8aca14e5c451cebb27724ed0

    • SHA256

      6f194457591e38ef91c704ee2e78d676158721b7123c5d6f1f7ab893525c1d0f

    • SHA512

      0c263a3401c4033de5383b33c2b10ae36fa1491658ef1278d98f39d68eb2ed421e2253fe374aca3e5691da489d09682adcb19587d679981d1e81ccfc0d1736e7

    • SSDEEP

      1536:0ItYxDHck2fKhIFcPKI3K/jzH3ZhWzoqxXKz1h:0I+xzfJ13yzpYzxx65h

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks