Resubmissions

07-11-2024 21:54

241107-1smw7s1rhm 10

General

  • Target

    YjJqp0O3NZzC.reg

  • Size

    89KB

  • Sample

    241107-1smw7s1rhm

  • MD5

    e0fc383452ae4ef76fbd8edaaea8208a

  • SHA1

    4101569ca940535cea9ddc24eab79a4c6ed5d790

  • SHA256

    cf6c2c3495096544c6957276ee7dfea94f4a6efbe9b94d36df73cd6bf14da39c

  • SHA512

    33160b4f22a42c3461cc8b193598d8abf20a5dc93965894c17856a08127474440211e3bda12d74f7ff1139ecebd07ec67efc64f3d75a396ccd44e83e73ebf832

  • SSDEEP

    1536:GlyQtvJw8Tq6YLgbJSoR0Qbu+l0V1iiYio5RTQlAwUWzI1YWsV2vRrYTxWy0:PolxhbM6buNfibjTUUWzB5Hth0

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

4.tcp.eu.ngrok.io:2024

4.tcp.eu.ngrok.io:13752

Mutex

RkZ0iMw0b8YJ

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      YjJqp0O3NZzC.reg

    • Size

      89KB

    • MD5

      e0fc383452ae4ef76fbd8edaaea8208a

    • SHA1

      4101569ca940535cea9ddc24eab79a4c6ed5d790

    • SHA256

      cf6c2c3495096544c6957276ee7dfea94f4a6efbe9b94d36df73cd6bf14da39c

    • SHA512

      33160b4f22a42c3461cc8b193598d8abf20a5dc93965894c17856a08127474440211e3bda12d74f7ff1139ecebd07ec67efc64f3d75a396ccd44e83e73ebf832

    • SSDEEP

      1536:GlyQtvJw8Tq6YLgbJSoR0Qbu+l0V1iiYio5RTQlAwUWzI1YWsV2vRrYTxWy0:PolxhbM6buNfibjTUUWzB5Hth0

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • System Binary Proxy Execution: Regsvcs/Regasm

      Abuse Regasm to proxy execution of malicious code.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks