General

  • Target

    https://cdn.discordapp.com/attachments/1304395568453517343/1304536571852357642/d419d5f6c043b027.exe?ex=672fbfdb&is=672e6e5b&hm=e76dbb9226fdb0e40bdbec1422f471e50f383af98ada3c2db1ebb7f2ac9214fe&

  • Sample

    241108-yyagys1nek

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

45.141.215.18:6606

Mutex

3kcW0vTGLmp6

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      https://cdn.discordapp.com/attachments/1304395568453517343/1304536571852357642/d419d5f6c043b027.exe?ex=672fbfdb&is=672e6e5b&hm=e76dbb9226fdb0e40bdbec1422f471e50f383af98ada3c2db1ebb7f2ac9214fe&

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks