General

  • Target

    5ab8a17246063f43e04f124c842427a9413d086796c1fd5e9d46917b308f5e74.exe

  • Size

    3.6MB

  • Sample

    241113-cwgycstpgv

  • MD5

    c76159163023302b08641b8d271ab362

  • SHA1

    c388606fb8394f7360da6cef38ec1526d2dc9ba1

  • SHA256

    5ab8a17246063f43e04f124c842427a9413d086796c1fd5e9d46917b308f5e74

  • SHA512

    53f2a3abd6337100f5fc8ed3da331c5cbb1b4478349c3b2dfc9547330770567bf7c5ced763e176c256cc16180032f816608d0a61d8e31db5ccf2f4f272aeaba2

  • SSDEEP

    49152:jWGtLBcXqFpa88R6SVb8kq4pgquLMMji4NYxtJpkxhGjIuTbR3339YcZUQ3EANa2:dtLuZIqgwh4NYxtJpkxhGB333tRaEp

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

DINERO

C2

octubre212024.giize.com:2727

fuertefuerte.accesscam.org:2727

octubre242024.casacam.net:2727

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      5ab8a17246063f43e04f124c842427a9413d086796c1fd5e9d46917b308f5e74.exe

    • Size

      3.6MB

    • MD5

      c76159163023302b08641b8d271ab362

    • SHA1

      c388606fb8394f7360da6cef38ec1526d2dc9ba1

    • SHA256

      5ab8a17246063f43e04f124c842427a9413d086796c1fd5e9d46917b308f5e74

    • SHA512

      53f2a3abd6337100f5fc8ed3da331c5cbb1b4478349c3b2dfc9547330770567bf7c5ced763e176c256cc16180032f816608d0a61d8e31db5ccf2f4f272aeaba2

    • SSDEEP

      49152:jWGtLBcXqFpa88R6SVb8kq4pgquLMMji4NYxtJpkxhGjIuTbR3339YcZUQ3EANa2:dtLuZIqgwh4NYxtJpkxhGB333tRaEp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks