General

  • Target

    test.exe

  • Size

    8.5MB

  • Sample

    241109-t7capaybmj

  • MD5

    fe88600b4e98eb0ac949ae43af0de141

  • SHA1

    24a14608b7c38f7e74d5c74f7c0f59032a99151e

  • SHA256

    53a48df43414b3ea7e0b61def5c565dec6ccd5debd90fbd7215f89ce5172d693

  • SHA512

    1c226bf339abd6be436243b783813ab6abc615ff5da3afb5ac948536ba86d1a7f5ae3f889c9f20271bad1d03ddd3b5e5db5ecf6b18f65483ae367406ec7293ff

  • SSDEEP

    196608:0qwvWk0XhJZNKbDTRv7fjS1PNFHQ1bl+XWf882sjqB0dI/r:20xRKDRzfWLx6l3f8+g

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:55496

127.0.0.1:37754

tcp://nasdnasnd-55496.portmap.host:55496:55496

tcp://nasdnasnd-55496.portmap.host:55496:37754

tcp://nasdnasnd-55496.portmap.host:55496

tcp://nasdnasnd-55496.portmap.host:37754

floor-getting.gl.at.ply.gg:55496

floor-getting.gl.at.ply.gg:37754

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      test.exe

    • Size

      8.5MB

    • MD5

      fe88600b4e98eb0ac949ae43af0de141

    • SHA1

      24a14608b7c38f7e74d5c74f7c0f59032a99151e

    • SHA256

      53a48df43414b3ea7e0b61def5c565dec6ccd5debd90fbd7215f89ce5172d693

    • SHA512

      1c226bf339abd6be436243b783813ab6abc615ff5da3afb5ac948536ba86d1a7f5ae3f889c9f20271bad1d03ddd3b5e5db5ecf6b18f65483ae367406ec7293ff

    • SSDEEP

      196608:0qwvWk0XhJZNKbDTRv7fjS1PNFHQ1bl+XWf882sjqB0dI/r:20xRKDRzfWLx6l3f8+g

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks