General

  • Target

    AsyncClient.exe

  • Size

    164KB

  • Sample

    241201-swxltayrhl

  • MD5

    b7a6d85bc95cb3b089057068c30f2d8b

  • SHA1

    864f88d3a1622e8ff48ea48e0c0efb639c079ee8

  • SHA256

    8a42ea3258ea46d5e218afe6d72080d7b7b891175220a1aab084b6a64735c4bd

  • SHA512

    e78f62936c0981a26722c6850f1e4b0e4b3befc8298d34cd0e63ec59615554dea2c402a1b81947e0ca1f9a883a6cacdb9901b02a1b99c371c26588fbdd3d1632

  • SSDEEP

    3072:iuQET/Lm2QskDy3bCgpf1bz8fvFG6GGGGGGGGGGGGGGGGGGG7sGGGGGJFpx:iuQ+TQO3bVhFg9G6GGGGGGGGGGGGGGGl

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

O4aZIBt8sGlP

Attributes
  • delay

    3

  • install

    true

  • install_file

    a.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      164KB

    • MD5

      b7a6d85bc95cb3b089057068c30f2d8b

    • SHA1

      864f88d3a1622e8ff48ea48e0c0efb639c079ee8

    • SHA256

      8a42ea3258ea46d5e218afe6d72080d7b7b891175220a1aab084b6a64735c4bd

    • SHA512

      e78f62936c0981a26722c6850f1e4b0e4b3befc8298d34cd0e63ec59615554dea2c402a1b81947e0ca1f9a883a6cacdb9901b02a1b99c371c26588fbdd3d1632

    • SSDEEP

      3072:iuQET/Lm2QskDy3bCgpf1bz8fvFG6GGGGGGGGGGGGGGGGGGG7sGGGGGJFpx:iuQ+TQO3bVhFg9G6GGGGGGGGGGGGGGGl

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks