General

  • Target

    da58732f8c52ededed023e7d604dd10e295ad436884b990c8f13e6660cc42b5e

  • Size

    264KB

  • Sample

    250107-x5f3msvnbw

  • MD5

    3fbc9d18f8e94a0b5b1e39134be7c153

  • SHA1

    be9a946fae242ff3b59ed41e0847338dfc90c58f

  • SHA256

    da58732f8c52ededed023e7d604dd10e295ad436884b990c8f13e6660cc42b5e

  • SHA512

    3909f08fed81bf6ff84c30ba531a098829dbc6ff54718abd79bb191e8d00ae7b8fcc2c0717c47bf1f988ac9cb197cd41283d9f8e78a3cbfbbcde68fcc251762a

  • SSDEEP

    1536:AvT4sMnsXsJk+74w76OwXLCqGO7f3XFPzm+efcYqJznK5Fb5uDSPVZrskXUkRhto:ev

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

COME00001

C2

dick2024.ddnsfree.com:6161

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      da58732f8c52ededed023e7d604dd10e295ad436884b990c8f13e6660cc42b5e

    • Size

      264KB

    • MD5

      3fbc9d18f8e94a0b5b1e39134be7c153

    • SHA1

      be9a946fae242ff3b59ed41e0847338dfc90c58f

    • SHA256

      da58732f8c52ededed023e7d604dd10e295ad436884b990c8f13e6660cc42b5e

    • SHA512

      3909f08fed81bf6ff84c30ba531a098829dbc6ff54718abd79bb191e8d00ae7b8fcc2c0717c47bf1f988ac9cb197cd41283d9f8e78a3cbfbbcde68fcc251762a

    • SSDEEP

      1536:AvT4sMnsXsJk+74w76OwXLCqGO7f3XFPzm+efcYqJznK5Fb5uDSPVZrskXUkRhto:ev

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks