General

  • Target

    AsyncClient.exe

  • Size

    47KB

  • Sample

    241116-ljtaastfmc

  • MD5

    aa1cb66d6c0a8299dc78cbfcdac7f235

  • SHA1

    57e58e7fa3848bdea41462d982a38e22cd9b2a09

  • SHA256

    febec09783082ac864bc91f22b29291e75effd36954f74b8b227acbaf3cb00d3

  • SHA512

    b9402c2dee780025d5dcd88923ecb7f1ef79260bc2543a9240cd46215dbd21c3af24503599372ccc7d2b8222993283ece16e09dca0e907a4b9a6e0aaefe02701

  • SSDEEP

    768:uu/6ZTgoiziWUUM9rmo2qrn9bFvPIzNrLkO7fD0bDI7y1v82rcSCuYkvhMFcgMB4:uu/6ZTgle2Y5ozN/kOMb0QvXcJEe9Kdi

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

V2

C2

guest-indices.gl.at.ply.gg:60223

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      47KB

    • MD5

      aa1cb66d6c0a8299dc78cbfcdac7f235

    • SHA1

      57e58e7fa3848bdea41462d982a38e22cd9b2a09

    • SHA256

      febec09783082ac864bc91f22b29291e75effd36954f74b8b227acbaf3cb00d3

    • SHA512

      b9402c2dee780025d5dcd88923ecb7f1ef79260bc2543a9240cd46215dbd21c3af24503599372ccc7d2b8222993283ece16e09dca0e907a4b9a6e0aaefe02701

    • SSDEEP

      768:uu/6ZTgoiziWUUM9rmo2qrn9bFvPIzNrLkO7fD0bDI7y1v82rcSCuYkvhMFcgMB4:uu/6ZTgle2Y5ozN/kOMb0QvXcJEe9Kdi

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • A potential corporate email address has been identified in the URL: [email protected]

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks