General

  • Target

    spoofer.exe

  • Size

    3.6MB

  • Sample

    241228-yz3j5a1nf1

  • MD5

    9316ff653c4cb2798b93c8933f43e61b

  • SHA1

    6c260ac0087aabb66b893afc3ef0955b982aea77

  • SHA256

    297e4ac9c22cf38b58241d60e16e4395ade705ca15769b796e9dbfcb5ac12aec

  • SHA512

    03ba1ab43684307f1b9aada2e7330bf65ca664f100610d69891bff2b3bbd5198cbc4da00967993bf8891cde79ab4128737b944ac97e9a14de3109e3262919bc0

  • SSDEEP

    98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      spoofer.exe

    • Size

      3.6MB

    • MD5

      9316ff653c4cb2798b93c8933f43e61b

    • SHA1

      6c260ac0087aabb66b893afc3ef0955b982aea77

    • SHA256

      297e4ac9c22cf38b58241d60e16e4395ade705ca15769b796e9dbfcb5ac12aec

    • SHA512

      03ba1ab43684307f1b9aada2e7330bf65ca664f100610d69891bff2b3bbd5198cbc4da00967993bf8891cde79ab4128737b944ac97e9a14de3109e3262919bc0

    • SSDEEP

      98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks