General

  • Target

    AsyncClient.exe

  • Size

    45KB

  • Sample

    241127-rw2p4axldw

  • MD5

    5fa25bd6cb4e68178b363f71ea04bdf6

  • SHA1

    3c97f0495a86882e8d56f2d268eb45bb58bfa4fc

  • SHA256

    dca3505bef2fa8716225290bbd194717630a1e8765b6b003d4a16e83f821f3c5

  • SHA512

    bdfbd399e547f9a9f51302b9c83598e259efff07c2b8d53523d67e07fe871ec80e00f501df14cafc31a261fc8eb4fed52f40f1b97fa4cbf9ecdc0f2635b0ac3b

  • SSDEEP

    768:VuyxNTAoZjRWUJd9bmo2qLwKjPGaG6PIyzjbFgX3i2qYo5xnRo5zHuBDZix:VuyxNTAGL2pKTkDy3bCXS2q/5xOJgdix

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

faculty-arrival.gl.at.ply.gg:9488

Mutex

Fq3dg5PMPvRh

Attributes
  • delay

    3

  • install

    true

  • install_file

    WINDOWS.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Botnet

Default

C2

technical-southwest.gl.at.ply.gg:58694

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      45KB

    • MD5

      5fa25bd6cb4e68178b363f71ea04bdf6

    • SHA1

      3c97f0495a86882e8d56f2d268eb45bb58bfa4fc

    • SHA256

      dca3505bef2fa8716225290bbd194717630a1e8765b6b003d4a16e83f821f3c5

    • SHA512

      bdfbd399e547f9a9f51302b9c83598e259efff07c2b8d53523d67e07fe871ec80e00f501df14cafc31a261fc8eb4fed52f40f1b97fa4cbf9ecdc0f2635b0ac3b

    • SSDEEP

      768:VuyxNTAoZjRWUJd9bmo2qLwKjPGaG6PIyzjbFgX3i2qYo5xnRo5zHuBDZix:VuyxNTAGL2pKTkDy3bCXS2q/5xOJgdix

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Modifies Windows Defender Real-time Protection settings

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

MITRE ATT&CK Enterprise v15

Tasks