General

  • Target

    a507c03e0b88aee3b3ad83f5ad5302b93bdea090e352357bee2e9220164113ed.exe

  • Size

    258KB

  • Sample

    241009-cjtrdsscqj

  • MD5

    c8ec3f5a2c12207a4783fd6104d02e3a

  • SHA1

    cd75c093ccaa40eac3d136f323adc1ae39ff0b8e

  • SHA256

    a507c03e0b88aee3b3ad83f5ad5302b93bdea090e352357bee2e9220164113ed

  • SHA512

    cdfb1defdebfa609588a219dff39fd509901216182bb53e91abc6e32b6c9dd9b519576671962eeb38dde0d6de0c236ad8508ad90d91b7057f2a5a21cc2b64431

  • SSDEEP

    6144:Xau1waoDb5akFjmNCuZWyfMoilBfrBs7orgSTUWI:Ku6aKFaguZW1oyNFgSTUr

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

154.216.17.207:7707

154.216.17.207:8808

154.216.17.207:1188

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    100

  • install

    true

  • install_file

    file.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      a507c03e0b88aee3b3ad83f5ad5302b93bdea090e352357bee2e9220164113ed.exe

    • Size

      258KB

    • MD5

      c8ec3f5a2c12207a4783fd6104d02e3a

    • SHA1

      cd75c093ccaa40eac3d136f323adc1ae39ff0b8e

    • SHA256

      a507c03e0b88aee3b3ad83f5ad5302b93bdea090e352357bee2e9220164113ed

    • SHA512

      cdfb1defdebfa609588a219dff39fd509901216182bb53e91abc6e32b6c9dd9b519576671962eeb38dde0d6de0c236ad8508ad90d91b7057f2a5a21cc2b64431

    • SSDEEP

      6144:Xau1waoDb5akFjmNCuZWyfMoilBfrBs7orgSTUWI:Ku6aKFaguZW1oyNFgSTUr

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks