General

  • Target

    AsyncClient.exe

  • Size

    47KB

  • Sample

    241123-nwkj2azrfl

  • MD5

    678c7b99496c1e045a6f8a7072f41902

  • SHA1

    fbc4bf034a1d4b0b7f0777da3dbf63ba2ea7d5de

  • SHA256

    b89c64e6cb8ac56910849b3340322f3ed1aa77be3aee2a9e081ff08819ce43bd

  • SHA512

    ac152cb621f2503178f82dfca62816cb13c91551c3f0c181c245117b3a1e2d9dbe022dce109f8e192d74e31c251a857770974f03c5f2b528017fe66e79195fc6

  • SSDEEP

    768:QuYH9T3kH1jWUvTqRmo2qbcrFgnNyGzYk5PIqPESVOs0bXbva5XPfG1tRulaADVg:QuYH9T34y2nFg7X2qPJEbDatPfG1tRue

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

juGfnQMxS4Ze

Attributes
  • delay

    3

  • install

    true

  • install_file

    Sync.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/s14cUU5G

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      47KB

    • MD5

      678c7b99496c1e045a6f8a7072f41902

    • SHA1

      fbc4bf034a1d4b0b7f0777da3dbf63ba2ea7d5de

    • SHA256

      b89c64e6cb8ac56910849b3340322f3ed1aa77be3aee2a9e081ff08819ce43bd

    • SHA512

      ac152cb621f2503178f82dfca62816cb13c91551c3f0c181c245117b3a1e2d9dbe022dce109f8e192d74e31c251a857770974f03c5f2b528017fe66e79195fc6

    • SSDEEP

      768:QuYH9T3kH1jWUvTqRmo2qbcrFgnNyGzYk5PIqPESVOs0bXbva5XPfG1tRulaADVg:QuYH9T34y2nFg7X2qPJEbDatPfG1tRue

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks