General

  • Target

    hilolxdbyelol.exe

  • Size

    223KB

  • Sample

    241110-m86glawcjg

  • MD5

    d026bbe5264359555b00c027717712d5

  • SHA1

    5c76e3a0a7f60a4bb5e10b2ef0a763588af5cb39

  • SHA256

    3e33e49c97e0b18132a77fe2b7933990e9b61ab1a41480f8ea87e5dd0d4dd821

  • SHA512

    f15660f28ebdd5bf803128756c679a7a546fb1de8fc76487335ac968ab40d3dd09c9eaa157831d00410efe2dee9f019fca10ee09e2a64173ebe3aa77d3cf2fc0

  • SSDEEP

    3072:xuWrToqZ2dsaWwSpw25bC7DwNGANhBF+3qMIwHeeeez8wkvg5FbAzsCibeiKe17x:xuWj8dsUuw25bhNtwsgccSIx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

w3wyv5F2c8ka

Attributes
  • delay

    3

  • install

    true

  • install_file

    hilolxdbyelol.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/s14cUU5G

aes.plain

Targets

    • Target

      hilolxdbyelol.exe

    • Size

      223KB

    • MD5

      d026bbe5264359555b00c027717712d5

    • SHA1

      5c76e3a0a7f60a4bb5e10b2ef0a763588af5cb39

    • SHA256

      3e33e49c97e0b18132a77fe2b7933990e9b61ab1a41480f8ea87e5dd0d4dd821

    • SHA512

      f15660f28ebdd5bf803128756c679a7a546fb1de8fc76487335ac968ab40d3dd09c9eaa157831d00410efe2dee9f019fca10ee09e2a64173ebe3aa77d3cf2fc0

    • SSDEEP

      3072:xuWrToqZ2dsaWwSpw25bC7DwNGANhBF+3qMIwHeeeez8wkvg5FbAzsCibeiKe17x:xuWj8dsUuw25bhNtwsgccSIx

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks