General

  • Target

    4c5784bccf200de9ed3ebaa19feaf81e7d77d6acb152e4fa1e01dc86be97c092

  • Size

    48KB

  • Sample

    250329-x989zsszbt

  • MD5

    0e9ffa3cb3c6d2e33322882c53bfd9fc

  • SHA1

    049810ff20e626c1b24bf670a5a03408d096111f

  • SHA256

    4c5784bccf200de9ed3ebaa19feaf81e7d77d6acb152e4fa1e01dc86be97c092

  • SHA512

    989a9cca2f09a294371eaff466859627f5e3c1d6a5962e2f6348df92df6306d6473ca31581c474b9ae35e140773fe1bba5aec0783fe0ae4f2dc8c3b8c184855b

  • SSDEEP

    768:ques1TYQZ3VWU1ymhbvmo2qjP1MlBymuXPIRe7fM6VJ0bvXmKKHaQeSE0a5YBDZL:ques1TYiFhN2pym1g7ftubvWKH0Iede6

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:1337

18.119.130.176:6606

18.119.130.176:7707

18.119.130.176:8808

18.119.130.176:1337

Mutex

3WIOtiO6KOc9

Attributes
  • delay

    3

  • install

    true

  • install_file

    RtlUpdate.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4c5784bccf200de9ed3ebaa19feaf81e7d77d6acb152e4fa1e01dc86be97c092

    • Size

      48KB

    • MD5

      0e9ffa3cb3c6d2e33322882c53bfd9fc

    • SHA1

      049810ff20e626c1b24bf670a5a03408d096111f

    • SHA256

      4c5784bccf200de9ed3ebaa19feaf81e7d77d6acb152e4fa1e01dc86be97c092

    • SHA512

      989a9cca2f09a294371eaff466859627f5e3c1d6a5962e2f6348df92df6306d6473ca31581c474b9ae35e140773fe1bba5aec0783fe0ae4f2dc8c3b8c184855b

    • SSDEEP

      768:ques1TYQZ3VWU1ymhbvmo2qjP1MlBymuXPIRe7fM6VJ0bvXmKKHaQeSE0a5YBDZL:ques1TYiFhN2pym1g7ftubvWKH0Iede6

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks