General

  • Target

    7B17EBBF77F53472D2FEBB38E9785026.exe

  • Size

    996KB

  • Sample

    241231-x5hapsvpew

  • MD5

    7b17ebbf77f53472d2febb38e9785026

  • SHA1

    f3e6e40de8a8ca8b7cc3f8f4d636ad788df39935

  • SHA256

    c23b7950208b8f8e8a22c401cb5e9a05e560ae6119307d975ba601b4e2e99273

  • SHA512

    40aeebe55e881e59d0a765a03dcf9d626cf6b83bf7fa667f63098c18d8d745f225a7d779ba1abaae1fdb185695df8bece6f7231c0b6c294ba52a48a5f083d4ac

  • SSDEEP

    24576:hN/BUBb+tYjBFHL68+WHE3YLXiM0hD6di/AX:jpUlRhTfHEoLXiM0hDTU

Malware Config

Extracted

Family

asyncrat

Version

| Edit by Vinom Rat

Botnet

Default

C2

195.26.255.81:6606

195.26.255.81:7707

195.26.255.81:8808

195.26.255.81:0077

195.26.255.81:1996

195.26.255.81:2106

195.26.255.81:7777

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      7B17EBBF77F53472D2FEBB38E9785026.exe

    • Size

      996KB

    • MD5

      7b17ebbf77f53472d2febb38e9785026

    • SHA1

      f3e6e40de8a8ca8b7cc3f8f4d636ad788df39935

    • SHA256

      c23b7950208b8f8e8a22c401cb5e9a05e560ae6119307d975ba601b4e2e99273

    • SHA512

      40aeebe55e881e59d0a765a03dcf9d626cf6b83bf7fa667f63098c18d8d745f225a7d779ba1abaae1fdb185695df8bece6f7231c0b6c294ba52a48a5f083d4ac

    • SSDEEP

      24576:hN/BUBb+tYjBFHL68+WHE3YLXiM0hD6di/AX:jpUlRhTfHEoLXiM0hDTU

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks