General

  • Target

    latencyx.exe

  • Size

    45KB

  • Sample

    241208-agkdtsxjer

  • MD5

    f4c46528fb0b51636d9c5860e0e4048e

  • SHA1

    76c0d55950b8e8995f0cc75d35f620f39d13ae1b

  • SHA256

    2ac2e1571a16168fb4ca930eb4b1a27fdbbff15f87384c13565f44fc22c4a8c7

  • SHA512

    aa6f1833ff1367bf938c2d52227707fb64c6ceaa5acbffd879150b094fc5a6b163e777ddbb7cc6cb33c3c15ec61ae7dbfc8c6462cf574bff43c88bf207fc80b9

  • SSDEEP

    768:GuEs9THvkHCWU0neImo2q88maPol53APIkzjb+gX3i90yHCFB/JkAX1kBDZSx:GuEs9THc72cfob3lk3bBXS908CFnkAXh

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

t1euvzy.localto.net:2171

t1euvzy.localto.net:55065

Mutex

ZpDC6oZwIVKp

Attributes
  • delay

    3

  • install

    false

  • install_file

    dwmm.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      latencyx.exe

    • Size

      45KB

    • MD5

      f4c46528fb0b51636d9c5860e0e4048e

    • SHA1

      76c0d55950b8e8995f0cc75d35f620f39d13ae1b

    • SHA256

      2ac2e1571a16168fb4ca930eb4b1a27fdbbff15f87384c13565f44fc22c4a8c7

    • SHA512

      aa6f1833ff1367bf938c2d52227707fb64c6ceaa5acbffd879150b094fc5a6b163e777ddbb7cc6cb33c3c15ec61ae7dbfc8c6462cf574bff43c88bf207fc80b9

    • SSDEEP

      768:GuEs9THvkHCWU0neImo2q88maPol53APIkzjb+gX3i90yHCFB/JkAX1kBDZSx:GuEs9THc72cfob3lk3bBXS908CFnkAXh

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks