General

  • Target

    AsyncClient.exe

  • Size

    45KB

  • Sample

    250302-xvn1ha11bv

  • MD5

    81e21d60aa7f1e86f3a15ad6d724b66e

  • SHA1

    b7c0a327bc94bd1e028be5260b3048682b425fd2

  • SHA256

    95178a095ee13744fc37d4419a38ccd8c42d3e04dbee979d8dce3cdfc41393a1

  • SHA512

    65aa633e191529774c5fcdbd8f6018a05b06e54411dd06413aa9c64b4dacba196adc1ea18a109f7598a22af6ab57fd2cc8873026d05eea23b0b9495e97bc06bb

  • SSDEEP

    768:vuwvNToEjaNLWU3+KZmo2q7cKjPGaG6PIyzjbFgX3irEpGXPlWXBDZLp:vuwvNToqad2JKTkDy3bCXSgINWRdLp

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

AsyncRAT_Mutex

Attributes
  • delay

    3

  • install

    true

  • install_file

    AsyncRAT.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/hcwJVFkr

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      45KB

    • MD5

      81e21d60aa7f1e86f3a15ad6d724b66e

    • SHA1

      b7c0a327bc94bd1e028be5260b3048682b425fd2

    • SHA256

      95178a095ee13744fc37d4419a38ccd8c42d3e04dbee979d8dce3cdfc41393a1

    • SHA512

      65aa633e191529774c5fcdbd8f6018a05b06e54411dd06413aa9c64b4dacba196adc1ea18a109f7598a22af6ab57fd2cc8873026d05eea23b0b9495e97bc06bb

    • SSDEEP

      768:vuwvNToEjaNLWU3+KZmo2q7cKjPGaG6PIyzjbFgX3irEpGXPlWXBDZLp:vuwvNToqad2JKTkDy3bCXSgINWRdLp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks