General
-
Target
AsyncClient.exe
-
Size
45KB
-
Sample
241127-rw2p4axldw
-
MD5
5fa25bd6cb4e68178b363f71ea04bdf6
-
SHA1
3c97f0495a86882e8d56f2d268eb45bb58bfa4fc
-
SHA256
dca3505bef2fa8716225290bbd194717630a1e8765b6b003d4a16e83f821f3c5
-
SHA512
bdfbd399e547f9a9f51302b9c83598e259efff07c2b8d53523d67e07fe871ec80e00f501df14cafc31a261fc8eb4fed52f40f1b97fa4cbf9ecdc0f2635b0ac3b
-
SSDEEP
768:VuyxNTAoZjRWUJd9bmo2qLwKjPGaG6PIyzjbFgX3i2qYo5xnRo5zHuBDZix:VuyxNTAGL2pKTkDy3bCXS2q/5xOJgdix
Malware Config
Extracted
asyncrat
0.5.8
Default
faculty-arrival.gl.at.ply.gg:9488
Fq3dg5PMPvRh
-
delay
3
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
technical-southwest.gl.at.ply.gg:58694
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
5fa25bd6cb4e68178b363f71ea04bdf6
-
SHA1
3c97f0495a86882e8d56f2d268eb45bb58bfa4fc
-
SHA256
dca3505bef2fa8716225290bbd194717630a1e8765b6b003d4a16e83f821f3c5
-
SHA512
bdfbd399e547f9a9f51302b9c83598e259efff07c2b8d53523d67e07fe871ec80e00f501df14cafc31a261fc8eb4fed52f40f1b97fa4cbf9ecdc0f2635b0ac3b
-
SSDEEP
768:VuyxNTAoZjRWUJd9bmo2qLwKjPGaG6PIyzjbFgX3i2qYo5xnRo5zHuBDZix:VuyxNTAGL2pKTkDy3bCXS2q/5xOJgdix
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1