General

  • Target

    a584a7be7d939b89cfa0507508a96b6ef245283b77b455ffb6274b99e780983eN.exe

  • Size

    1.3MB

  • Sample

    241114-f8dy1svgjp

  • MD5

    430a1421e7deca92dca9bbf7b5752601

  • SHA1

    7a18ca451cabb1c722fba5f6e5325ba3f2625fe4

  • SHA256

    655a42ce44e971a78e5cb395b056a32e274eacc64a6137d23b6748f875eaf6a2

  • SHA512

    4922ea0e167c4e507ac97193439c41227ddbc85932eea9bdbbacea6edd7f63ed794f2dbdde541375d4d3b62331c0b05a4bb172e0bd4029241287ee0fa1da00ad

  • SSDEEP

    24576:prEh3ZijTdfoXBZ4K1BunL32SenhydzeN1PXjmc/muTM7Eyv/fkVvMUD:pcZigZ4KX8D2BN1PhmZHv/cBD

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

silenceme.duckdns.org:6606

silenceme.duckdns.org:7707

silenceme.duckdns.org:8808

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      a584a7be7d939b89cfa0507508a96b6ef245283b77b455ffb6274b99e780983eN.exe

    • Size

      1.3MB

    • MD5

      430a1421e7deca92dca9bbf7b5752601

    • SHA1

      7a18ca451cabb1c722fba5f6e5325ba3f2625fe4

    • SHA256

      655a42ce44e971a78e5cb395b056a32e274eacc64a6137d23b6748f875eaf6a2

    • SHA512

      4922ea0e167c4e507ac97193439c41227ddbc85932eea9bdbbacea6edd7f63ed794f2dbdde541375d4d3b62331c0b05a4bb172e0bd4029241287ee0fa1da00ad

    • SSDEEP

      24576:prEh3ZijTdfoXBZ4K1BunL32SenhydzeN1PXjmc/muTM7Eyv/fkVvMUD:pcZigZ4KX8D2BN1PhmZHv/cBD

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks