General

  • Target

    msdtc.exe

  • Size

    47KB

  • Sample

    241207-2qqqratkep

  • MD5

    2731a98129622a67a970a173dda353ef

  • SHA1

    4a705cfafbf7b1b543612203d09b16445a34887f

  • SHA256

    804fb0f9b639fb03310d7cb96b74172d7dca3edcb1fc94b8caaa7cdad6d81e49

  • SHA512

    0b471cac88b99408f9c653bf4feb0947e944c466b55931881790b64fcd6606b42e2960687208f0a7ea3d10b1df3c18cc51fdf8f6f197acdc4df1f293b28cf0fd

  • SSDEEP

    768:8uX9m9T3YkeaWUMneAmo2qhtrKerR2L17BPIpvRIAe/o0b74e09w8Q1/znXTBDZl:8uX9m9T3Pg2ApXpvRO/Db7G9JQjdw+

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

87.120.113.125:6606

87.120.113.125:7707

87.120.113.125:8808

Mutex

NnE2Recf2msF

Attributes
  • delay

    3

  • install

    true

  • install_file

    dwmm.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      msdtc.exe

    • Size

      47KB

    • MD5

      2731a98129622a67a970a173dda353ef

    • SHA1

      4a705cfafbf7b1b543612203d09b16445a34887f

    • SHA256

      804fb0f9b639fb03310d7cb96b74172d7dca3edcb1fc94b8caaa7cdad6d81e49

    • SHA512

      0b471cac88b99408f9c653bf4feb0947e944c466b55931881790b64fcd6606b42e2960687208f0a7ea3d10b1df3c18cc51fdf8f6f197acdc4df1f293b28cf0fd

    • SSDEEP

      768:8uX9m9T3YkeaWUMneAmo2qhtrKerR2L17BPIpvRIAe/o0b74e09w8Q1/znXTBDZl:8uX9m9T3Pg2ApXpvRO/Db7G9JQjdw+

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks