General

  • Target

    2024-10-24_a1bc90eb0593fff728ebdb07fa5be49d_mafia_rhadamanthys

  • Size

    2.4MB

  • Sample

    241024-hjrvpazcln

  • MD5

    a1bc90eb0593fff728ebdb07fa5be49d

  • SHA1

    4d4a732df8f1f78e3084c00e2c3dacfbbb411abc

  • SHA256

    a306e433e72c97ac9016f9f260f882362d7dfa8735f86384ee70046304430e25

  • SHA512

    0ee42280d3d11d87db579e6dea847cc672f15e9fedd642d66921f759558b95f970674e310c4b41d2efc99524dda54e65411586815f9866dc8b71c2716fb8b0b6

  • SSDEEP

    49152:azJioJ67eQD9rSlAthuDZzjz4YVw7bf33fKo:jnJudzjz4YAT

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

OCTU21

C2

mnnioudfd.duckdns.org:8010

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2024-10-24_a1bc90eb0593fff728ebdb07fa5be49d_mafia_rhadamanthys

    • Size

      2.4MB

    • MD5

      a1bc90eb0593fff728ebdb07fa5be49d

    • SHA1

      4d4a732df8f1f78e3084c00e2c3dacfbbb411abc

    • SHA256

      a306e433e72c97ac9016f9f260f882362d7dfa8735f86384ee70046304430e25

    • SHA512

      0ee42280d3d11d87db579e6dea847cc672f15e9fedd642d66921f759558b95f970674e310c4b41d2efc99524dda54e65411586815f9866dc8b71c2716fb8b0b6

    • SSDEEP

      49152:azJioJ67eQD9rSlAthuDZzjz4YVw7bf33fKo:jnJudzjz4YAT

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks