General

  • Target

    617b85633e1c3d7bdb93bfb405a2af4fd350f2e9f6c0a22eda52057200893e08

  • Size

    880KB

  • Sample

    241129-3v7eqsspgw

  • MD5

    295c1f301702c01c586e3d3dc15b59b8

  • SHA1

    5d2bf77ea243a1862df423e9ab3cff4af31d55cd

  • SHA256

    617b85633e1c3d7bdb93bfb405a2af4fd350f2e9f6c0a22eda52057200893e08

  • SHA512

    5efb318cd7f3819eda842c1d9fc8680fbb13859a28686971502c30b4cf59bb3f16a48cabd903f04a1db9b16f908cc62b13e288f3e75173d95c4564f49fb5cf67

  • SSDEEP

    12288:9CdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgaurODb1PQ:9Cdxte/80jYLT3U1jfsWaurODRPQ

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

orcus.ddns.net:1337

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      617b85633e1c3d7bdb93bfb405a2af4fd350f2e9f6c0a22eda52057200893e08

    • Size

      880KB

    • MD5

      295c1f301702c01c586e3d3dc15b59b8

    • SHA1

      5d2bf77ea243a1862df423e9ab3cff4af31d55cd

    • SHA256

      617b85633e1c3d7bdb93bfb405a2af4fd350f2e9f6c0a22eda52057200893e08

    • SHA512

      5efb318cd7f3819eda842c1d9fc8680fbb13859a28686971502c30b4cf59bb3f16a48cabd903f04a1db9b16f908cc62b13e288f3e75173d95c4564f49fb5cf67

    • SSDEEP

      12288:9CdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgaurODb1PQ:9Cdxte/80jYLT3U1jfsWaurODRPQ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks