General

  • Target

    police.zip

  • Size

    972B

  • Sample

    241122-mfdacavmdk

  • MD5

    5ca963d18d77aaf56c141efd52c3747f

  • SHA1

    79143863621947df8f6c0596f4419d7f1e935188

  • SHA256

    3442a9e4f21d14a478076694bf1dd44268e950262270e7637936c05657531462

  • SHA512

    8bd1395a1129b246bf364b67dccc8eb63b50e948924e0870d7dc5c03a3a16a2f7808842b888cdc21fcb2dff7cf13fe061239c3941e03d40e75fc084e883b1d60

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://109.199.101.109:770/xx.jpg

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

samsalah1.freeddns.org:1005

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Sat.bat

    • Size

      2KB

    • MD5

      0e2fff554ddadc58aaff7978ec06aa32

    • SHA1

      b453b17905235ea96150c90711285f7879d3afc0

    • SHA256

      64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80

    • SHA512

      c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks