General

  • Target

    f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b

  • Size

    53KB

  • Sample

    241231-gms2gsxpbp

  • MD5

    a61b4683de0819ea1759ab9213ac77d7

  • SHA1

    8b96224454aa706139d751816c724a882ac563ed

  • SHA256

    f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b

  • SHA512

    de600e0d26208ecd66e3bb647e9316e2bba2e7b5282c615c603878034f0a5ea6612ca48a82768181fb3fe611659e9f226ad053b7f8970978a7f302ad2dec7f5b

  • SSDEEP

    768:bTA6UyXqdGMaZpbWPU/xHn1ftNSWMyOpcHOl2k5j/FBWKP62r9a8tYcFGVc6K:AvzOLbWmHrlMyEc/WFBXFr9aAGVcl

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

WindowsProcess2555AV738w30weweew28378

Attributes
  • delay

    1

  • install

    true

  • install_file

    WindowsUserPerformanceMonitor.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/hBHVtPrB

aes.plain

Targets

    • Target

      f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b

    • Size

      53KB

    • MD5

      a61b4683de0819ea1759ab9213ac77d7

    • SHA1

      8b96224454aa706139d751816c724a882ac563ed

    • SHA256

      f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b

    • SHA512

      de600e0d26208ecd66e3bb647e9316e2bba2e7b5282c615c603878034f0a5ea6612ca48a82768181fb3fe611659e9f226ad053b7f8970978a7f302ad2dec7f5b

    • SSDEEP

      768:bTA6UyXqdGMaZpbWPU/xHn1ftNSWMyOpcHOl2k5j/FBWKP62r9a8tYcFGVc6K:AvzOLbWmHrlMyEc/WFBXFr9aAGVcl

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks