General

  • Target

    FLXTOOLS.exe

  • Size

    63KB

  • Sample

    250104-d1nr5sypes

  • MD5

    8b3affb035dc48cb81e416570ee9889a

  • SHA1

    bb8b2cd080000afe9b35bf923897acd6df5054f3

  • SHA256

    6b5c1e03cf018925d9b7e9c5089afe13578f7c56614cd689f23413c13819bdad

  • SHA512

    8f221bcbdf1f9a2146c3102e7daee7e4a3877e3fd83d76bf81f9cfd323c4846da8e347ff823629113d6f867909ce3d32e8d4c9f605dac7026258dc10fff71b66

  • SSDEEP

    768:EpDxI6PfZ778/IC8A+X3GDXKc5t+cV48Jg1+T4nSGGHmDbD0ph0oXrvRXtSuMdph:262ZBmDXHwcKUpUbqh9LdcuMdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

FLXTOOLS

C2

ohio-darkness.gl.at.ply.gg:13836

Attributes
  • delay

    1

  • install

    true

  • install_file

    FLXTOOLS.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      FLXTOOLS.exe

    • Size

      63KB

    • MD5

      8b3affb035dc48cb81e416570ee9889a

    • SHA1

      bb8b2cd080000afe9b35bf923897acd6df5054f3

    • SHA256

      6b5c1e03cf018925d9b7e9c5089afe13578f7c56614cd689f23413c13819bdad

    • SHA512

      8f221bcbdf1f9a2146c3102e7daee7e4a3877e3fd83d76bf81f9cfd323c4846da8e347ff823629113d6f867909ce3d32e8d4c9f605dac7026258dc10fff71b66

    • SSDEEP

      768:EpDxI6PfZ778/IC8A+X3GDXKc5t+cV48Jg1+T4nSGGHmDbD0ph0oXrvRXtSuMdph:262ZBmDXHwcKUpUbqh9LdcuMdpqKmY7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks