General

  • Target

    4710511b247d22015b72aca41c3b152a2eac5258d426d620daee4661a94f8f91.exe

  • Size

    1.3MB

  • Sample

    241113-z7ghaszbkf

  • MD5

    28f2501cc15062e392de5ec62796a33e

  • SHA1

    06b1670e848520f39ca554b376aa1df177bdcb18

  • SHA256

    4710511b247d22015b72aca41c3b152a2eac5258d426d620daee4661a94f8f91

  • SHA512

    1ce8e32b307da7ada6ed8b8323c0155d8e7d95f99650f8c362d7c7bd288d94825b4c0544028feb0fa8759a3dc0f336cffb8c5de325abcc7c97171b086c8c982a

  • SSDEEP

    24576:prEh3ZijTdfoXBZ4K1BunL32SenhydzeN1PXjmc/muTM7Eyv/fkVvMUw:pcZigZ4KX8D2BN1PhmZHv/cBw

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

silenceme.duckdns.org:6606

silenceme.duckdns.org:7707

silenceme.duckdns.org:8808

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4710511b247d22015b72aca41c3b152a2eac5258d426d620daee4661a94f8f91.exe

    • Size

      1.3MB

    • MD5

      28f2501cc15062e392de5ec62796a33e

    • SHA1

      06b1670e848520f39ca554b376aa1df177bdcb18

    • SHA256

      4710511b247d22015b72aca41c3b152a2eac5258d426d620daee4661a94f8f91

    • SHA512

      1ce8e32b307da7ada6ed8b8323c0155d8e7d95f99650f8c362d7c7bd288d94825b4c0544028feb0fa8759a3dc0f336cffb8c5de325abcc7c97171b086c8c982a

    • SSDEEP

      24576:prEh3ZijTdfoXBZ4K1BunL32SenhydzeN1PXjmc/muTM7Eyv/fkVvMUw:pcZigZ4KX8D2BN1PhmZHv/cBw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks