General

  • Target

    JaffaCakes118_9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997

  • Size

    300.0MB

  • Sample

    241224-zs2vpaxkhx

  • MD5

    09d3660e122050f7daeef7650eaf4d5f

  • SHA1

    485b17fdead4fd0917266739f905593d8d82bb43

  • SHA256

    9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997

  • SHA512

    a6d83a17d34c3050e957bb4f9d0d672b0ea9c129377e0ed0409a75f8d73cb4ad7368f076a5b303805a6a734e3ad6098003b570de60702ef498d62880382452ec

  • SSDEEP

    3145728:ex1MFn6eC4YVC4m5oih6p7UUUUUMMTeD9GGtg:Gm5osTj5

Malware Config

Extracted

Family

asyncrat

Version

VenomRAT 5.0.3

Botnet

FEB-25-FRI

C2

feb23-pandor.duckdns.org:25045

Mutex

we4320fmef

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      JaffaCakes118_9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997

    • Size

      300.0MB

    • MD5

      09d3660e122050f7daeef7650eaf4d5f

    • SHA1

      485b17fdead4fd0917266739f905593d8d82bb43

    • SHA256

      9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997

    • SHA512

      a6d83a17d34c3050e957bb4f9d0d672b0ea9c129377e0ed0409a75f8d73cb4ad7368f076a5b303805a6a734e3ad6098003b570de60702ef498d62880382452ec

    • SSDEEP

      3145728:ex1MFn6eC4YVC4m5oih6p7UUUUUMMTeD9GGtg:Gm5osTj5

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks