General

  • Target

    Infected.exe

  • Size

    63KB

  • Sample

    241201-ytmayszqd1

  • MD5

    45db61adfe86228dd20597126a684af8

  • SHA1

    3aa8f5b1c78b1361f7bd5dfa5b7dd24139318451

  • SHA256

    53ff78b28192c5bcff9d2ebb969478dde46da1ffc70216a62dcb213d20244b01

  • SHA512

    87575618fcb0324fdc671c19a6046802b92276944f18f1ddc56dea20ae86ca33ed0aa52f559a711313ecdc80885da2fd980ead9fe0397e434b5701c66e5490cf

  • SSDEEP

    768:ijSu/n3jzh78J4C8A+XTSazcBRL5JTk1+T4KSBGHmDbD/ph0oXiYlDgh/5Sugdph:UrzV4dSJYUbdh9AIugdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

comment-seasons.gl.at.ply.gg:13056

Attributes
  • delay

    1

  • install

    true

  • install_file

    susamogus.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Infected.exe

    • Size

      63KB

    • MD5

      45db61adfe86228dd20597126a684af8

    • SHA1

      3aa8f5b1c78b1361f7bd5dfa5b7dd24139318451

    • SHA256

      53ff78b28192c5bcff9d2ebb969478dde46da1ffc70216a62dcb213d20244b01

    • SHA512

      87575618fcb0324fdc671c19a6046802b92276944f18f1ddc56dea20ae86ca33ed0aa52f559a711313ecdc80885da2fd980ead9fe0397e434b5701c66e5490cf

    • SSDEEP

      768:ijSu/n3jzh78J4C8A+XTSazcBRL5JTk1+T4KSBGHmDbD/ph0oXiYlDgh/5Sugdph:UrzV4dSJYUbdh9AIugdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Renames multiple (1280) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks