General

  • Target

    AsyncClient.exe

  • Size

    47KB

  • Sample

    241226-z9pxfs1lej

  • MD5

    dee1187bd04663123bee93ef3c121f97

  • SHA1

    a1ebad9c7974ba236cd1869f798ff045b23d680d

  • SHA256

    9c634eadf89f71c1e08935c48e9f4ee7bf8f1451814d6b5eb96d2afc68e62dc0

  • SHA512

    c7ef58181ebdacedb79074557b2b7a4d02d58434998d23ada6a0412413500d9195d2e01103879368b79bdda6b41da09707886504c52bee6ff56226295b8db5ef

  • SSDEEP

    768:5uyqFTMIGZ8btAWUu7y6mo2q8e75gbvb3vPIvPB+7Rvb0be22lrWmi01eWru6j1t:5uyqFTMtkf2KSvb3ovPAFvwbe22ZFiy/

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

192.168.0.14:6606

192.168.0.14:7707

192.168.0.14:8808

Mutex

fS9gexl8XlMZ

Attributes
  • delay

    3

  • install

    true

  • install_file

    control.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      47KB

    • MD5

      dee1187bd04663123bee93ef3c121f97

    • SHA1

      a1ebad9c7974ba236cd1869f798ff045b23d680d

    • SHA256

      9c634eadf89f71c1e08935c48e9f4ee7bf8f1451814d6b5eb96d2afc68e62dc0

    • SHA512

      c7ef58181ebdacedb79074557b2b7a4d02d58434998d23ada6a0412413500d9195d2e01103879368b79bdda6b41da09707886504c52bee6ff56226295b8db5ef

    • SSDEEP

      768:5uyqFTMIGZ8btAWUu7y6mo2q8e75gbvb3vPIvPB+7Rvb0be22lrWmi01eWru6j1t:5uyqFTMtkf2KSvb3ovPAFvwbe22ZFiy/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks