General

  • Target

    BootStrapper.exe

  • Size

    70KB

  • Sample

    241103-hfvgeaxkfy

  • MD5

    c801faeb55c9207eb2a2eb6d01a40147

  • SHA1

    b49b8b24f77a4331546ce7ad829fb254cc823bd7

  • SHA256

    ffb940a781e1863b4627ff098741593b3634283382ac40650e10c81e36f3aa0a

  • SHA512

    9932ab4eb8dbc5f08a1b24c1925a715265ea0af8f08bdd4096349b1ffbc7c8e9e6fcc8e8b11996d47bf32f1126632fdaad541ee6869ec038f1f059dbd5e96cff

  • SSDEEP

    1536:9x1bczsF7VinStbNppWGv1xUA89quIhiMequprC/3pFfPI1UX9Nntek:9x1PinS/ppWGtx4qb3pKCX9Nsk

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

specific-charles.gl.at.ply.gg:46182

Attributes
  • delay

    1

  • install

    true

  • install_file

    gooner.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      BootStrapper.exe

    • Size

      70KB

    • MD5

      c801faeb55c9207eb2a2eb6d01a40147

    • SHA1

      b49b8b24f77a4331546ce7ad829fb254cc823bd7

    • SHA256

      ffb940a781e1863b4627ff098741593b3634283382ac40650e10c81e36f3aa0a

    • SHA512

      9932ab4eb8dbc5f08a1b24c1925a715265ea0af8f08bdd4096349b1ffbc7c8e9e6fcc8e8b11996d47bf32f1126632fdaad541ee6869ec038f1f059dbd5e96cff

    • SSDEEP

      1536:9x1bczsF7VinStbNppWGv1xUA89quIhiMequprC/3pFfPI1UX9Nntek:9x1PinS/ppWGtx4qb3pKCX9Nsk

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks