General

  • Target

    Johnnyspanel.exe

  • Size

    63KB

  • Sample

    241012-eccwea1gqd

  • MD5

    e6b3b8ea39d8bc6eea1c703295d17ef2

  • SHA1

    34babad08af3f8ae9f4e6507625167038d479dd7

  • SHA256

    c40a6434008cf6fb6738f64bc52b5aa0f93cf50dec65c3d84e34174cfd3e962d

  • SHA512

    24a5505feddfe229304fd4c15af49e81e02cddbc0bc1612daa9a670fa13faab90a729079cdf1fbec176cda88c8ffcb6822d1f6aafeb5be774b15d7e45d829563

  • SSDEEP

    768:S+BAGkPhz/n78FoC8A+Xk+YDT8JHy31+T4ySBGHmDbDgps0oXnoIIjzsSukdpqKX:Tq/bL2h39YUbWs9oVzrukdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    Run.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Johnnyspanel.exe

    • Size

      63KB

    • MD5

      e6b3b8ea39d8bc6eea1c703295d17ef2

    • SHA1

      34babad08af3f8ae9f4e6507625167038d479dd7

    • SHA256

      c40a6434008cf6fb6738f64bc52b5aa0f93cf50dec65c3d84e34174cfd3e962d

    • SHA512

      24a5505feddfe229304fd4c15af49e81e02cddbc0bc1612daa9a670fa13faab90a729079cdf1fbec176cda88c8ffcb6822d1f6aafeb5be774b15d7e45d829563

    • SSDEEP

      768:S+BAGkPhz/n78FoC8A+Xk+YDT8JHy31+T4ySBGHmDbDgps0oXnoIIjzsSukdpqKX:Tq/bL2h39YUbWs9oVzrukdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Modifies system executable filetype association

MITRE ATT&CK Enterprise v15

Tasks