General

  • Target

    970e81aeea72951190a05b9584ec9c9032c0092cfa93044fdc2d15470dbdc800.exe

  • Size

    569KB

  • Sample

    241122-nvtrbawkgl

  • MD5

    a2394da8278d3f6809953b56dd204af5

  • SHA1

    4d051f54e91cce1b676226871deb0102862c77da

  • SHA256

    970e81aeea72951190a05b9584ec9c9032c0092cfa93044fdc2d15470dbdc800

  • SHA512

    a1ee4fc1684e7e544b5e7017cef2eaa085839eac96497697cbde7b006af5c197aa50e426dd464f0760048405dacf865d133187e3f2eb6339cb5689baa8274f4f

  • SSDEEP

    6144:PC4w8juap56y9dg4sIo9ZCf6YRZDYooV3FtlyPG4wYeVKiEgQaratgM/:Knapvg4sz9dYRZsx1tvpEVar3M/

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

1

C2

185.157.160.136:1973

Mutex

df4Rtg34dFjwr7ujp3

Attributes
  • delay

    38

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      970e81aeea72951190a05b9584ec9c9032c0092cfa93044fdc2d15470dbdc800.exe

    • Size

      569KB

    • MD5

      a2394da8278d3f6809953b56dd204af5

    • SHA1

      4d051f54e91cce1b676226871deb0102862c77da

    • SHA256

      970e81aeea72951190a05b9584ec9c9032c0092cfa93044fdc2d15470dbdc800

    • SHA512

      a1ee4fc1684e7e544b5e7017cef2eaa085839eac96497697cbde7b006af5c197aa50e426dd464f0760048405dacf865d133187e3f2eb6339cb5689baa8274f4f

    • SSDEEP

      6144:PC4w8juap56y9dg4sIo9ZCf6YRZDYooV3FtlyPG4wYeVKiEgQaratgM/:Knapvg4sz9dYRZsx1tvpEVar3M/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks