General

  • Target

    roaricle.exe

  • Size

    63KB

  • Sample

    241207-dfkvrasld1

  • MD5

    9f39043be09533636bbfdd4ec3101f6a

  • SHA1

    1e964ba2a874c24a5fdc430c827a1ba82dc657ab

  • SHA256

    179027517e90f9e8173f63ba247d7c0d414259fdef3a29a5692c85d84dce557d

  • SHA512

    09c0573e2f4db331714d86d32abf9623b5a9560c1e7ac8359a0ef434cc79940143e837a2674aa5140b79e1b1302faf75df9959d184109aad231db78a90139233

  • SSDEEP

    1536:PJxFz3FI8Cwof4wJ6Vfh2MBPG2bPw0mQCfhGxZVclN:PJxFz3FI8Cwo7J6VJL1G2bPTCfwzY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

fojeweb571-45302.portmap.host:4782

fojeweb571-45302.portmap.host:45302

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    windows defender firewall.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      roaricle.exe

    • Size

      63KB

    • MD5

      9f39043be09533636bbfdd4ec3101f6a

    • SHA1

      1e964ba2a874c24a5fdc430c827a1ba82dc657ab

    • SHA256

      179027517e90f9e8173f63ba247d7c0d414259fdef3a29a5692c85d84dce557d

    • SHA512

      09c0573e2f4db331714d86d32abf9623b5a9560c1e7ac8359a0ef434cc79940143e837a2674aa5140b79e1b1302faf75df9959d184109aad231db78a90139233

    • SSDEEP

      1536:PJxFz3FI8Cwof4wJ6Vfh2MBPG2bPw0mQCfhGxZVclN:PJxFz3FI8Cwo7J6VJL1G2bPTCfwzY

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks