General

  • Target

    J74N3UGkQRFbJPTK.exe

  • Size

    8.2MB

  • Sample

    241031-xb5txazrdz

  • MD5

    e0cf4901b5fe2a17af5a369e7faeab1b

  • SHA1

    2d71a612c66a267d71f39769b2ab3d7e99035764

  • SHA256

    66cfe98bdab5ba7bc9642ae084b708deb928d4688b9bc577c5add8b021cbcafe

  • SHA512

    22dbf9e1d71822ffd6c5505a2eeffb46fbf75d5e5cec9fba619ccf78100ec9a5f6063fafce1f07bcdae3eeb8ec0732661ba15fca7bf57bb08d0943b1d0512df6

  • SSDEEP

    196608:sfU3F+AqdanoW6dyebDOuKMXRlbO0OeRzM1Hyq:8qFovIebSDwyeZMpX

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

dns.njalla.pl:4500

dns.njalla.pl:7854

dns.njalla.si:4500

dns.njalla.si:7854

Mutex

O7kXyfiG4vsr

Attributes
  • delay

    3

  • install

    false

  • install_file

    GoogleUpdate.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      J74N3UGkQRFbJPTK.exe

    • Size

      8.2MB

    • MD5

      e0cf4901b5fe2a17af5a369e7faeab1b

    • SHA1

      2d71a612c66a267d71f39769b2ab3d7e99035764

    • SHA256

      66cfe98bdab5ba7bc9642ae084b708deb928d4688b9bc577c5add8b021cbcafe

    • SHA512

      22dbf9e1d71822ffd6c5505a2eeffb46fbf75d5e5cec9fba619ccf78100ec9a5f6063fafce1f07bcdae3eeb8ec0732661ba15fca7bf57bb08d0943b1d0512df6

    • SSDEEP

      196608:sfU3F+AqdanoW6dyebDOuKMXRlbO0OeRzM1Hyq:8qFovIebSDwyeZMpX

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks