General

  • Target

    output.bat

  • Size

    46KB

  • Sample

    241130-26h1vaykfs

  • MD5

    8962ec15efd02a1a96c54aac7878a620

  • SHA1

    1c587e367111cf850bdda811e55c97076264c6a1

  • SHA256

    dfc981ff489e6ba91c43acceb32b3f5e518b001ac611742e32c828e09202e66b

  • SHA512

    5ab987b13a0b9ffc02020c9177e32e46350cd3ab6650954ba49a9de68fc56c353bee6a6cec1f1dc53f04123ea914c64cb5752ebd33c468cc9709bff31a3bee4b

  • SSDEEP

    768:Mfh+sVMVei1JzM6VZS5mEF7Zn4sLzrZsuL6QZVt6DAmVeT3HaaXhk34Kra2:y1iLzMW4rFV4s9suLjZVg8qeTXacxKr3

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

6.tcp.eu.ngrok.io:19580

6.tcp.eu.ngrok.io:2024

6.tcp.eu.ngrok.io:15251

Mutex

UkUiX8RLZesC

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      output.bat

    • Size

      46KB

    • MD5

      8962ec15efd02a1a96c54aac7878a620

    • SHA1

      1c587e367111cf850bdda811e55c97076264c6a1

    • SHA256

      dfc981ff489e6ba91c43acceb32b3f5e518b001ac611742e32c828e09202e66b

    • SHA512

      5ab987b13a0b9ffc02020c9177e32e46350cd3ab6650954ba49a9de68fc56c353bee6a6cec1f1dc53f04123ea914c64cb5752ebd33c468cc9709bff31a3bee4b

    • SSDEEP

      768:Mfh+sVMVei1JzM6VZS5mEF7Zn4sLzrZsuL6QZVt6DAmVeT3HaaXhk34Kra2:y1iLzMW4rFV4s9suLjZVg8qeTXacxKr3

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks