General

  • Target

    AsyncClient.exe

  • Size

    48KB

  • Sample

    250302-yemyyasxev

  • MD5

    b1d29d8fc59b08eb0210a4d2eb012f24

  • SHA1

    b5bb6c4cb6f3e96a23c96ece80e7b7489f2df10d

  • SHA256

    bf1e9a3da04e68db0ef21f10f325a50fd03e2e904fad987a4fb1ff54afb06472

  • SHA512

    eadb8da0abfa2a46652d9deeb1a1e8641a0eb92f470f7d1570d05bfd408a722b66767b57524d0f258b7843c9a093c32236196adb59cdc1ab60e09b34f0c78839

  • SSDEEP

    768:eu4H9TskvpDWUPlNxmo2qbv0ETM/pza0+PIgkXSFT00brU5NtC8A5zwB6HOs8SBc:eu4H9Tswb2vF/pPgkil3brWNy5zwiHdS

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

MRFZkpFPMV7e

Attributes
  • delay

    3

  • install

    true

  • install_file

    AsyncRAT.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/hcwJVFkr

aes.plain

Targets

    • Target

      AsyncClient.exe

    • Size

      48KB

    • MD5

      b1d29d8fc59b08eb0210a4d2eb012f24

    • SHA1

      b5bb6c4cb6f3e96a23c96ece80e7b7489f2df10d

    • SHA256

      bf1e9a3da04e68db0ef21f10f325a50fd03e2e904fad987a4fb1ff54afb06472

    • SHA512

      eadb8da0abfa2a46652d9deeb1a1e8641a0eb92f470f7d1570d05bfd408a722b66767b57524d0f258b7843c9a093c32236196adb59cdc1ab60e09b34f0c78839

    • SSDEEP

      768:eu4H9TskvpDWUPlNxmo2qbv0ETM/pza0+PIgkXSFT00brU5NtC8A5zwB6HOs8SBc:eu4H9Tswb2vF/pPgkil3brWNy5zwiHdS

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks