General

  • Target

    lkklnsgtnsdfgdfgsdfg.exe

  • Size

    47KB

  • Sample

    241209-1k6z4ssmaw

  • MD5

    f6dac35d571337de0dcbfd8488519383

  • SHA1

    f7807ad2b9c086889e492a3ff8e9a47df0d9ee19

  • SHA256

    fbd85258618d241a24904b372d95d4db16fa344e555ebdea2fe59e4c506194c0

  • SHA512

    5f26dec175882f1740e405fa7129043a705d47de295547d4ce0a6047255b77994e398f26aa552b0ae119785749ae02f6339eadc97b5fc9c3e28cb3a1b60971c1

  • SSDEEP

    768:DuQKNTREhzxrWUXrm5mo2q7ZwuoFI0rxfvR6fPIy840bMUCLDCUtdv8ewBkd6WRz:DuQKNTR+W2ZuojxfvR3y8zbpZU38eO0Z

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:61882

rahyufgsaf-61882.portmap.host:6606

rahyufgsaf-61882.portmap.host:7707

rahyufgsaf-61882.portmap.host:8808

rahyufgsaf-61882.portmap.host:61882

Mutex

jQF9EeB2cbGS

Attributes
  • delay

    3

  • install

    true

  • install_file

    roar.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      lkklnsgtnsdfgdfgsdfg.exe

    • Size

      47KB

    • MD5

      f6dac35d571337de0dcbfd8488519383

    • SHA1

      f7807ad2b9c086889e492a3ff8e9a47df0d9ee19

    • SHA256

      fbd85258618d241a24904b372d95d4db16fa344e555ebdea2fe59e4c506194c0

    • SHA512

      5f26dec175882f1740e405fa7129043a705d47de295547d4ce0a6047255b77994e398f26aa552b0ae119785749ae02f6339eadc97b5fc9c3e28cb3a1b60971c1

    • SSDEEP

      768:DuQKNTREhzxrWUXrm5mo2q7ZwuoFI0rxfvR6fPIy840bMUCLDCUtdv8ewBkd6WRz:DuQKNTR+W2ZuojxfvR3y8zbpZU38eO0Z

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks