General

  • Target

    3b8fc9046c06420b3382cf851595370e4bb75ad0330c44515ad6bedb286dbfc7.ps1

  • Size

    2.0MB

  • Sample

    241219-c5bgyatlhx

  • MD5

    4e71954ab5a47de9f74938dc0cd3c84f

  • SHA1

    781b4cffead59d083d301c7eec7d55250b5a4317

  • SHA256

    3b8fc9046c06420b3382cf851595370e4bb75ad0330c44515ad6bedb286dbfc7

  • SHA512

    3a44a383686308352a5499d21a30317c61ea8caa81145001af22f5de536a2f3e73da43fafca53696be3923e86bb8780e5b503c3e5f379c1407362fca3909cd80

  • SSDEEP

    24576:bSgmuyXfET5YN3b2LLG1z/7E4/KpdMJczdsrbIm:biMSNKLq1zjAU

Malware Config

Extracted

Family

asyncrat

Version

A 12

Botnet

MuGz_New

C2

sasaa.kozow.com:6606

Mutex

AsyncMutex_fsasaa.kozow.com

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3b8fc9046c06420b3382cf851595370e4bb75ad0330c44515ad6bedb286dbfc7.ps1

    • Size

      2.0MB

    • MD5

      4e71954ab5a47de9f74938dc0cd3c84f

    • SHA1

      781b4cffead59d083d301c7eec7d55250b5a4317

    • SHA256

      3b8fc9046c06420b3382cf851595370e4bb75ad0330c44515ad6bedb286dbfc7

    • SHA512

      3a44a383686308352a5499d21a30317c61ea8caa81145001af22f5de536a2f3e73da43fafca53696be3923e86bb8780e5b503c3e5f379c1407362fca3909cd80

    • SSDEEP

      24576:bSgmuyXfET5YN3b2LLG1z/7E4/KpdMJczdsrbIm:biMSNKLq1zjAU

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks