General

  • Target

    c919f26a41610ce0ffe338b710f7ec886a332264b9e904cb6d870cea68c52ddc

  • Size

    6.7MB

  • Sample

    250329-x5mv7atmv4

  • MD5

    023895789f0f3e300db204bedefae206

  • SHA1

    6d5242724ae417f834070175b2ba6a3115159218

  • SHA256

    c919f26a41610ce0ffe338b710f7ec886a332264b9e904cb6d870cea68c52ddc

  • SHA512

    22836fb3e1df717783818dbcb00df2e66e40feba7f82ade434ed80356b5f825d5adc91fbb8514ffc5b00c2cde5fe553a83f4c0f9b04350f74cb5dd3ad536dd76

  • SSDEEP

    98304:bpTcxdOp2H+n8352zgc3d1F3HWYi6DibJTnNQ4q0GL5IVuL:wOpzn8pOgc3N32z6AnNliWVu

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

cases-rica.gl.at.ply.gg:58042

Mutex

BpOFKi9vnu0z

Attributes
  • delay

    3

  • install

    true

  • install_file

    update.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      c919f26a41610ce0ffe338b710f7ec886a332264b9e904cb6d870cea68c52ddc

    • Size

      6.7MB

    • MD5

      023895789f0f3e300db204bedefae206

    • SHA1

      6d5242724ae417f834070175b2ba6a3115159218

    • SHA256

      c919f26a41610ce0ffe338b710f7ec886a332264b9e904cb6d870cea68c52ddc

    • SHA512

      22836fb3e1df717783818dbcb00df2e66e40feba7f82ade434ed80356b5f825d5adc91fbb8514ffc5b00c2cde5fe553a83f4c0f9b04350f74cb5dd3ad536dd76

    • SSDEEP

      98304:bpTcxdOp2H+n8352zgc3d1F3HWYi6DibJTnNQ4q0GL5IVuL:wOpzn8pOgc3N32z6AnNliWVu

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Async RAT payload

    • XMRig Miner payload

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks