General
-
Target
AsyncClient.exe
-
Size
47KB
-
Sample
250224-vc94xatkw4
-
MD5
edef73fe037f84abd153e9a799031f9f
-
SHA1
b1b726ae00d8becdaff35d4cf19151d43c711377
-
SHA256
ab95e6bfce66a0389b5c179d37edc04d2907d9ba8a38f9de0f9a51fa3997ff59
-
SHA512
1c33ddd39b3059efa195cd72e3a96f0d5f5133b1f636bd218cce0daaea07ef89d5759cbf6de119b7aa2f8376f9cda990bc7a39d2a8ef7f812e47f9423c7e2ee7
-
SSDEEP
768:tuwpFTAY3IQWUe9jqmo2qLlQDrW2khM3LRPI3Z7m0b/48r6NODImJg4BDZvx:tuwpFTA4/2lDrW2H3LO3Ztb/TOCdvx
Malware Config
Extracted
asyncrat
0.5.8
Default
77.100.63.251:5631
SXPNYKU9S8ry
-
delay
3
-
install
true
-
install_file
Disc367.exe
-
install_folder
%AppData%
Extracted
xworm
5.0
77.100.63.251:5631
7FpV9gDxM8mUiAIE
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Targets
-
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
edef73fe037f84abd153e9a799031f9f
-
SHA1
b1b726ae00d8becdaff35d4cf19151d43c711377
-
SHA256
ab95e6bfce66a0389b5c179d37edc04d2907d9ba8a38f9de0f9a51fa3997ff59
-
SHA512
1c33ddd39b3059efa195cd72e3a96f0d5f5133b1f636bd218cce0daaea07ef89d5759cbf6de119b7aa2f8376f9cda990bc7a39d2a8ef7f812e47f9423c7e2ee7
-
SSDEEP
768:tuwpFTAY3IQWUe9jqmo2qLlQDrW2khM3LRPI3Z7m0b/48r6NODImJg4BDZvx:tuwpFTA4/2lDrW2H3LO3Ztb/TOCdvx
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Async RAT payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-