General

  • Target

    03122024_1407_Drawing&specification.scr.iso

  • Size

    1.5MB

  • Sample

    241203-rfbtqsylfv

  • MD5

    77f7a1479649881933cf583f591a4078

  • SHA1

    82ad7cced45ed5450af0284593f24b87c7017158

  • SHA256

    af3f13c8612eaffa17ce8c41933bcbd89071394057940536ce61eea285fe286e

  • SHA512

    b294d5b67828daf1535e3a332fa9d813d89c5b0ef919dec8dd7c3331f9be297f37cc5fc0d1cb046b5a5d6420774ef821a6e8e62574238193f2ad20186be13443

  • SSDEEP

    24576:Ou6J33O0c+JY5UZ+XC0kGso6FaNXpPkMeCWY:Au0c++OCvkGs9FaNhkZY

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

69.174.100.131:6606

Mutex

abkZfsCYRZhk

Attributes
  • delay

    10

  • install

    false

  • install_file

    order.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Drawing&specification.scr

    • Size

      945KB

    • MD5

      bc18b6803a287e63b3668b5817f12419

    • SHA1

      bc21190df092d93629068c705ea8dc630d3db4a4

    • SHA256

      8f42d1e07595808544eed18a45e8d7220dff40597d4d53d0f63fab47554afbdf

    • SHA512

      2c29abcd294fd09e39cb604192628c2e4aa71241575ac38644c0fd7e5ac6b77c1f12302003636f166747d7b44649c7a9d31915e1b2c6c5fa09201428187c59e2

    • SSDEEP

      24576:nu6J33O0c+JY5UZ+XC0kGso6FaNXpPkMeCWY:hu0c++OCvkGs9FaNhkZY

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Drops startup file

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks