General

  • Target

    beac54161d73fc530e3bff90cb7f7f5e.bat

  • Size

    13KB

  • Sample

    241217-kk94rsvphw

  • MD5

    beac54161d73fc530e3bff90cb7f7f5e

  • SHA1

    0034230a87b352f1fab34211bd6691717ddbb68b

  • SHA256

    69474069c929065596f1c0ebda5f40a102dc5c4fe152da3d5e8e92210cf84f7d

  • SHA512

    fe4292896814ad4e60be94e5993c5ff85c8fe38215be32342775021fa9017b1fcce10f1a782509e341e740a3817f60108744317c920f2a6b57727f66c3050820

  • SSDEEP

    192:O+UsWf/t0hVd43DsM7sBcv49xnvWhZIayGRX2X7WX1XCYAGZuapp39fRhNLmU7q/:SsScluCnV7340zeipmM

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

103.125.189.155:8848

Mutex

DcRatMutex_adxzvxv

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      beac54161d73fc530e3bff90cb7f7f5e.bat

    • Size

      13KB

    • MD5

      beac54161d73fc530e3bff90cb7f7f5e

    • SHA1

      0034230a87b352f1fab34211bd6691717ddbb68b

    • SHA256

      69474069c929065596f1c0ebda5f40a102dc5c4fe152da3d5e8e92210cf84f7d

    • SHA512

      fe4292896814ad4e60be94e5993c5ff85c8fe38215be32342775021fa9017b1fcce10f1a782509e341e740a3817f60108744317c920f2a6b57727f66c3050820

    • SSDEEP

      192:O+UsWf/t0hVd43DsM7sBcv49xnvWhZIayGRX2X7WX1XCYAGZuapp39fRhNLmU7q/:SsScluCnV7340zeipmM

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks