General

  • Target

    dcratt.exe

  • Size

    63KB

  • Sample

    241211-1y36dazmhx

  • MD5

    58efa839d0d139bcfa6af4e1ea77ccf3

  • SHA1

    b9558c3f42724ee4a5442bc98bb5107fa8cc9a48

  • SHA256

    fd0159f07670e56444d3a919127a644f960e1d4ad24779a23459bdbfdb0db6bb

  • SHA512

    8a839734bef3f3b7c5cb365c413d95d607875446a73fef50fc30c6f81031ef9d0be8a227b4d0c199d6f6dc7720ce85ac68505fe2fbbb26837af907d52b543a47

  • SSDEEP

    1536:UhjExLDRwQuNMXbmaeWs1lRIZaGEGbbkw7etI3ZGxZVclN:UhjExLDRwQuNMXbreFliZavGbbkmm8os

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

147.185.221.24:4580

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      dcratt.exe

    • Size

      63KB

    • MD5

      58efa839d0d139bcfa6af4e1ea77ccf3

    • SHA1

      b9558c3f42724ee4a5442bc98bb5107fa8cc9a48

    • SHA256

      fd0159f07670e56444d3a919127a644f960e1d4ad24779a23459bdbfdb0db6bb

    • SHA512

      8a839734bef3f3b7c5cb365c413d95d607875446a73fef50fc30c6f81031ef9d0be8a227b4d0c199d6f6dc7720ce85ac68505fe2fbbb26837af907d52b543a47

    • SSDEEP

      1536:UhjExLDRwQuNMXbmaeWs1lRIZaGEGbbkw7etI3ZGxZVclN:UhjExLDRwQuNMXbreFliZavGbbkmm8os

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Renames multiple (4486) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

MITRE ATT&CK Matrix

Tasks