General

  • Target

    AsyncClient.exe

  • Size

    45KB

  • Sample

    250118-w1e44szpcy

  • MD5

    6fc628eb737082731b5aa55d58146c33

  • SHA1

    e724ede1e28f22f6ff865c092321e6d8e8b94d67

  • SHA256

    898181e54072487190869cb3b829cbeeb2863b271e767acdfea8199d804e04ab

  • SHA512

    7bfdee03a71780697ae8e216a1a495901b01de0b17e7570686cec77df5804c10542e1a72b21c7ae793be730f3148be7f3a1b8f805e6e7d1b90fab4f2361dd1ec

  • SSDEEP

    768:ZuyV5TdMhGqWU8Durmo2qrBKjPGaG6PIyzjbFgX3iu1dok2uNmhLCoBDZrx:ZuyV5TdCf2oKTkDy3bCXSKogePdrx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:2024

127.0.0.1:12376

127.0.0.1:15398

127.0.0.1:13666

127.0.0.1:14211

127.0.0.1:17148

127.0.0.1:11989

127.0.0.1:16590

127.0.0.1:15255

5.tcp.eu.ngrok.io:6606

5.tcp.eu.ngrok.io:7707

5.tcp.eu.ngrok.io:8808

5.tcp.eu.ngrok.io:2024

5.tcp.eu.ngrok.io:12376

5.tcp.eu.ngrok.io:15398

5.tcp.eu.ngrok.io:13666

5.tcp.eu.ngrok.io:14211

Mutex

ZAeZX525qatF

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      45KB

    • MD5

      6fc628eb737082731b5aa55d58146c33

    • SHA1

      e724ede1e28f22f6ff865c092321e6d8e8b94d67

    • SHA256

      898181e54072487190869cb3b829cbeeb2863b271e767acdfea8199d804e04ab

    • SHA512

      7bfdee03a71780697ae8e216a1a495901b01de0b17e7570686cec77df5804c10542e1a72b21c7ae793be730f3148be7f3a1b8f805e6e7d1b90fab4f2361dd1ec

    • SSDEEP

      768:ZuyV5TdMhGqWU8Durmo2qrBKjPGaG6PIyzjbFgX3iu1dok2uNmhLCoBDZrx:ZuyV5TdCf2oKTkDy3bCXSKogePdrx

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks