General

  • Target

    crackers.rar

  • Size

    25KB

  • Sample

    241213-ymw7ksxqgy

  • MD5

    aa7aeddc68534067f04cba538ff43423

  • SHA1

    36afe36fc4a16f8fe5a90971a5cd356b54b2e33b

  • SHA256

    6e037135b5dc8ce75267fcc8215a48041ef8ffa1409dad74799d1295b66f7321

  • SHA512

    e781bfd76a0e980c4502c0d8609c5d01494098bd9c80fce99202fdd35947c43885efaa311ab129109283830bf43656d55e60b14488b6a1b769899aba46b5d211

  • SSDEEP

    768:Qndpw8zHhJuqGMIJaPIrVszW18ZYm/UWGcqZSnh:g/w8zHLnDIMIrf8emYrSh

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:1194

193.161.193.99:1194

Mutex

PX50IrcSQ5Gg

Attributes
  • delay

    3

  • install

    true

  • install_file

    crackers.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      crackers.rar

    • Size

      25KB

    • MD5

      aa7aeddc68534067f04cba538ff43423

    • SHA1

      36afe36fc4a16f8fe5a90971a5cd356b54b2e33b

    • SHA256

      6e037135b5dc8ce75267fcc8215a48041ef8ffa1409dad74799d1295b66f7321

    • SHA512

      e781bfd76a0e980c4502c0d8609c5d01494098bd9c80fce99202fdd35947c43885efaa311ab129109283830bf43656d55e60b14488b6a1b769899aba46b5d211

    • SSDEEP

      768:Qndpw8zHhJuqGMIJaPIrVszW18ZYm/UWGcqZSnh:g/w8zHLnDIMIrf8emYrSh

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks