General

  • Target

    0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.unknown

  • Size

    438KB

  • Sample

    250128-gcwdvsypav

  • MD5

    674301ae02422ceb065a4174c7b9113a

  • SHA1

    ba0b9c514114aa9cc8eed504c770a4f9da0c5674

  • SHA256

    0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e

  • SHA512

    aa70aa019b196ea338d5cd97f4b5296050e696a5a97b0ed4c4fbd4a23dc9e734fcd8cb56314c04814ebae2ec07645d86e536453fabb9dd3c4af13c6f8870f187

  • SSDEEP

    1536:TjdW/z20+u4dXNR8WrlDnnlVYw7VM4kD2Fq5AGGzeQz4JnImgzP8RiPmHnClK+dv:TjYw7Ev1P4RtluJs

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Fox_Mado

Mutex

0000_000

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/r3hJ4btd

aes.plain

Targets

    • Target

      0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.unknown

    • Size

      438KB

    • MD5

      674301ae02422ceb065a4174c7b9113a

    • SHA1

      ba0b9c514114aa9cc8eed504c770a4f9da0c5674

    • SHA256

      0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e

    • SHA512

      aa70aa019b196ea338d5cd97f4b5296050e696a5a97b0ed4c4fbd4a23dc9e734fcd8cb56314c04814ebae2ec07645d86e536453fabb9dd3c4af13c6f8870f187

    • SSDEEP

      1536:TjdW/z20+u4dXNR8WrlDnnlVYw7VM4kD2Fq5AGGzeQz4JnImgzP8RiPmHnClK+dv:TjYw7Ev1P4RtluJs

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks