General

  • Target

    Infected.exe

  • Size

    63KB

  • Sample

    250301-1djagatjz3

  • MD5

    317b2a41283a0fb957f3ee4be929e738

  • SHA1

    18fbd09687d66ce1abb22e0af60fa097d30fe70b

  • SHA256

    302e533f5b7cb99608677421f5a2960c48d0c431fca8bbe6ae7eda5c57aca4a9

  • SHA512

    da5bb6447f21aed036af06ba229341886bc4ff296466a8161614ab61abfd9333d04a096d4f8ac9db40ebbc8b276d3ded5dca8fbfffd2594857c9b33e0fd0a7f3

  • SSDEEP

    768:CmUvnkjXf78dwC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oX828kSusdpqKYhY7:6wXzLdSJYUbdh98vusdpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

6.tcp.ngrok.io:11205

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Infected.exe

    • Size

      63KB

    • MD5

      317b2a41283a0fb957f3ee4be929e738

    • SHA1

      18fbd09687d66ce1abb22e0af60fa097d30fe70b

    • SHA256

      302e533f5b7cb99608677421f5a2960c48d0c431fca8bbe6ae7eda5c57aca4a9

    • SHA512

      da5bb6447f21aed036af06ba229341886bc4ff296466a8161614ab61abfd9333d04a096d4f8ac9db40ebbc8b276d3ded5dca8fbfffd2594857c9b33e0fd0a7f3

    • SSDEEP

      768:CmUvnkjXf78dwC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oX828kSusdpqKYhY7:6wXzLdSJYUbdh98vusdpqKmY7

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks