General

  • Target

    bb11c0b847be578c727bd146e232a82eb65b8c43ad1657b200e12416b5fb3e3b.vbs

  • Size

    49KB

  • Sample

    241213-dgnb9syjgq

  • MD5

    50e3a17992c509fd34daf21f3d408733

  • SHA1

    99001c7b061914c9caaf7ef2ba75f25ac3498d82

  • SHA256

    bb11c0b847be578c727bd146e232a82eb65b8c43ad1657b200e12416b5fb3e3b

  • SHA512

    e21c89778aecaa7a532f5d953a87b6ed575a14788556b67b3311ffec188d492bd633773ee81879c1451cf6ed1ad4c189bf41f07fc8dbba72bd07103a53597849

  • SSDEEP

    768:I+1zXj3HDb1sybJRpN9/NVAdEamHuaxBsgV29+DY9lYUP7bFQqrSwli:IIzTzL/vtNV/RHvM5ADeHFn0

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

38.255.42.40:1020

Mutex

ZOmahQBSRciB

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      bb11c0b847be578c727bd146e232a82eb65b8c43ad1657b200e12416b5fb3e3b.vbs

    • Size

      49KB

    • MD5

      50e3a17992c509fd34daf21f3d408733

    • SHA1

      99001c7b061914c9caaf7ef2ba75f25ac3498d82

    • SHA256

      bb11c0b847be578c727bd146e232a82eb65b8c43ad1657b200e12416b5fb3e3b

    • SHA512

      e21c89778aecaa7a532f5d953a87b6ed575a14788556b67b3311ffec188d492bd633773ee81879c1451cf6ed1ad4c189bf41f07fc8dbba72bd07103a53597849

    • SSDEEP

      768:I+1zXj3HDb1sybJRpN9/NVAdEamHuaxBsgV29+DY9lYUP7bFQqrSwli:IIzTzL/vtNV/RHvM5ADeHFn0

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks