General

  • Target

    raokfhsjdgfb.exe

  • Size

    47KB

  • Sample

    241211-1rmj2stqhq

  • MD5

    750a92e39718ae101d63a8e6c11ba788

  • SHA1

    8619dc026b09a14cd92c8521e700b702ffe25507

  • SHA256

    bd1736e672b3766e998c37fae9aaf8e381bc9300538e1533f97f88dc4c706817

  • SHA512

    a8c32a3adb01473f10023be9b9757d638ac3006f13ea9c5d4a664a9af0d0a4cebff33ca8dd537d87ba083cb99b4f2f187636d158ec2a1d96e4089354c5648d39

  • SSDEEP

    768:kuY69T3kH1jWUvTqRmo2qbz7njNrPaPIlsR10bPHefQB1AL2UWBDZcx:kuY69T34y2gNPlskbP+fzL2Vdcx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

weak-onions-tap.loca.lt:6606

weak-onions-tap.loca.lt:7707

weak-onions-tap.loca.lt:8808

Mutex

kal8dl52UUgv

Attributes
  • delay

    3

  • install

    true

  • install_file

    roar.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      raokfhsjdgfb.exe

    • Size

      47KB

    • MD5

      750a92e39718ae101d63a8e6c11ba788

    • SHA1

      8619dc026b09a14cd92c8521e700b702ffe25507

    • SHA256

      bd1736e672b3766e998c37fae9aaf8e381bc9300538e1533f97f88dc4c706817

    • SHA512

      a8c32a3adb01473f10023be9b9757d638ac3006f13ea9c5d4a664a9af0d0a4cebff33ca8dd537d87ba083cb99b4f2f187636d158ec2a1d96e4089354c5648d39

    • SSDEEP

      768:kuY69T3kH1jWUvTqRmo2qbz7njNrPaPIlsR10bPHefQB1AL2UWBDZcx:kuY69T34y2gNPlskbP+fzL2Vdcx

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks