General

  • Target

    AutoAfkClickerLauncher.exe

  • Size

    63KB

  • Sample

    250301-1de8tatjy9

  • MD5

    390437b31c7da088ee70e01c96e41b8d

  • SHA1

    068b389aec23c2cddff54009c54064c968538552

  • SHA256

    cdc18bb3c4bda6ea450a8928fdbe10e59fd198926f5761824387977c8c4a1594

  • SHA512

    a35f1cc97afe6b4dd48a3f705320724d41a09f8571c41b2a1f0573ac04745adaef186363d85d1d96add7d1dfa9b873ecb14a9e544cf1481d060d50f25a74b321

  • SSDEEP

    1536:XvCCPT9oapuKN7YUbNhB/IIMRuAdpqKmY7:Xvv+noYUbN8IMzGz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

6.tcp.ngrok.io:8848

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      AutoAfkClickerLauncher.exe

    • Size

      63KB

    • MD5

      390437b31c7da088ee70e01c96e41b8d

    • SHA1

      068b389aec23c2cddff54009c54064c968538552

    • SHA256

      cdc18bb3c4bda6ea450a8928fdbe10e59fd198926f5761824387977c8c4a1594

    • SHA512

      a35f1cc97afe6b4dd48a3f705320724d41a09f8571c41b2a1f0573ac04745adaef186363d85d1d96add7d1dfa9b873ecb14a9e544cf1481d060d50f25a74b321

    • SSDEEP

      1536:XvCCPT9oapuKN7YUbNhB/IIMRuAdpqKmY7:Xvv+noYUbN8IMzGz

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks