General

  • Target

    4c1038736179e8e41ca05d45bb16a81d01f509ebb9d9051a0095ffb4b9da81ea.ps1

  • Size

    170KB

  • Sample

    250128-pabwfa1lhj

  • MD5

    ae98402f9b834ba696e9a052ce1a4e1d

  • SHA1

    55c5faf22fafc5d9d15c3e93f72e25a75635ec5f

  • SHA256

    4c1038736179e8e41ca05d45bb16a81d01f509ebb9d9051a0095ffb4b9da81ea

  • SHA512

    75543b384b09f0f4ee0015ffb93e2271e6ea7c9b85d582cdd60aeaf0dcc26ca42b3190894de1a97cf3413473751c9f8f4bab4f5d0f3c5d5c2d547b5231f70e75

  • SSDEEP

    3072:nQoHePEWgLAVVwNW5rKJNXQSiAigHJQ+cL8hDcseHcTt6tPgzGJKMsCU:nRHePEWgLOVwNW5rKJNXxvK7U

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Test

C2

81.10.39.58:7077

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4c1038736179e8e41ca05d45bb16a81d01f509ebb9d9051a0095ffb4b9da81ea.ps1

    • Size

      170KB

    • MD5

      ae98402f9b834ba696e9a052ce1a4e1d

    • SHA1

      55c5faf22fafc5d9d15c3e93f72e25a75635ec5f

    • SHA256

      4c1038736179e8e41ca05d45bb16a81d01f509ebb9d9051a0095ffb4b9da81ea

    • SHA512

      75543b384b09f0f4ee0015ffb93e2271e6ea7c9b85d582cdd60aeaf0dcc26ca42b3190894de1a97cf3413473751c9f8f4bab4f5d0f3c5d5c2d547b5231f70e75

    • SSDEEP

      3072:nQoHePEWgLAVVwNW5rKJNXQSiAigHJQ+cL8hDcseHcTt6tPgzGJKMsCU:nRHePEWgLOVwNW5rKJNXxvK7U

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks