General

  • Target

    Dc.exe

  • Size

    47KB

  • Sample

    250107-xcna9avpgj

  • MD5

    ff744d24089c2b37d56b4483c6db217a

  • SHA1

    4de25b3c976c958aa83d868ee4e8f891b1df1ef2

  • SHA256

    3afbdfdaf9738f85294d3b1179e6e3200b8aeccfb38b9caf8dd6c25ac9f5bdb8

  • SHA512

    fa84b86856665619b2a720db84c92beacf0dcbca976cc29ed2018a7d07afab6a2d29e4d07dc060a5a98e029adcdb6d247e4585bbf59fdd75be4c00721234ddbc

  • SSDEEP

    768:Zy+0zzILMmY4+jiRUvi56lxYbIgezKD6cGpIvEgK/JDZVc6KN:E+SQR8sbfzD6/InkJDZVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

necatisoff-36486.portmap.host:36486

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    wdf.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      Dc.exe

    • Size

      47KB

    • MD5

      ff744d24089c2b37d56b4483c6db217a

    • SHA1

      4de25b3c976c958aa83d868ee4e8f891b1df1ef2

    • SHA256

      3afbdfdaf9738f85294d3b1179e6e3200b8aeccfb38b9caf8dd6c25ac9f5bdb8

    • SHA512

      fa84b86856665619b2a720db84c92beacf0dcbca976cc29ed2018a7d07afab6a2d29e4d07dc060a5a98e029adcdb6d247e4585bbf59fdd75be4c00721234ddbc

    • SSDEEP

      768:Zy+0zzILMmY4+jiRUvi56lxYbIgezKD6cGpIvEgK/JDZVc6KN:E+SQR8sbfzD6/InkJDZVclN

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Enterprise v15

Tasks