General

  • Target

    2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024..exe.bin

  • Size

    1.1MB

  • Sample

    241125-x9fyfayqbk

  • MD5

    db4e57ae7d70bec8d1d44632a28004bd

  • SHA1

    a98a5ada1ce9d46e325f510b4736b77a031f0733

  • SHA256

    26d5629e80aa0bd3d327b929693da12e11fd34415015d6b139f3f27ffd671bc1

  • SHA512

    1f565cb1dc5e09fb074ba437aa7cf948d9c8cf5d8e7ba038a384efa500d02c959aa54d94101cbf15fd4f16a395d4d487ab2b3c8f9aea8740954ec00c3e4a5f6a

  • SSDEEP

    24576:1T5sjqhntP/VAyLBklsb0CdHtNjyuP7B5cbjrx3ZdTDn4dk:F/jPd/klsb0CdHtNjE5fn4dk

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

TDC

C2

noviembre07.ydns.eu:2525

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024..exe.bin

    • Size

      1.1MB

    • MD5

      db4e57ae7d70bec8d1d44632a28004bd

    • SHA1

      a98a5ada1ce9d46e325f510b4736b77a031f0733

    • SHA256

      26d5629e80aa0bd3d327b929693da12e11fd34415015d6b139f3f27ffd671bc1

    • SHA512

      1f565cb1dc5e09fb074ba437aa7cf948d9c8cf5d8e7ba038a384efa500d02c959aa54d94101cbf15fd4f16a395d4d487ab2b3c8f9aea8740954ec00c3e4a5f6a

    • SSDEEP

      24576:1T5sjqhntP/VAyLBklsb0CdHtNjyuP7B5cbjrx3ZdTDn4dk:F/jPd/klsb0CdHtNjE5fn4dk

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks