General

  • Target

    a584a7be7d939b89cfa0507508a96b6ef245283b77b455ffb6274b99e780983eN

  • Size

    1.3MB

  • Sample

    241111-m2kasayerf

  • MD5

    6511ba24b6f6898fe498f9d263ebf700

  • SHA1

    d7baa1f7af6a0b68f2299ac132046a3833b5d551

  • SHA256

    a584a7be7d939b89cfa0507508a96b6ef245283b77b455ffb6274b99e780983e

  • SHA512

    0bd20922dc985d14238b4e5b4d282c5564aadc52f2ae0ed1e4ad6aa7a864bd1a4e1bfc2af96e3fc8da9b17b21522f1f69727a051f3d46f4662fd2b6979972086

  • SSDEEP

    24576:prEh3ZijTdfoXBZ4K1BunL32SenhydzeN1PXjmc/muTM7Eyv/fkVvMU:pcZigZ4KX8D2BN1PhmZHv/cB

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

silenceme.duckdns.org:6606

silenceme.duckdns.org:7707

silenceme.duckdns.org:8808

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      a584a7be7d939b89cfa0507508a96b6ef245283b77b455ffb6274b99e780983eN

    • Size

      1.3MB

    • MD5

      6511ba24b6f6898fe498f9d263ebf700

    • SHA1

      d7baa1f7af6a0b68f2299ac132046a3833b5d551

    • SHA256

      a584a7be7d939b89cfa0507508a96b6ef245283b77b455ffb6274b99e780983e

    • SHA512

      0bd20922dc985d14238b4e5b4d282c5564aadc52f2ae0ed1e4ad6aa7a864bd1a4e1bfc2af96e3fc8da9b17b21522f1f69727a051f3d46f4662fd2b6979972086

    • SSDEEP

      24576:prEh3ZijTdfoXBZ4K1BunL32SenhydzeN1PXjmc/muTM7Eyv/fkVvMU:pcZigZ4KX8D2BN1PhmZHv/cB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks