General

  • Target

    RuntimeBroker.exe

  • Size

    48KB

  • Sample

    250329-zzznxatvhy

  • MD5

    f814cb9c71d35f8bd503b6d9949aca22

  • SHA1

    96cb19b70bbcab9627cc3c37a384287a1162dc7c

  • SHA256

    d5965c899e5413e91ab7b75669b35d6797b5462c64f99f217a4014e8e4deafbd

  • SHA512

    072b7a7cc5be22435d9c498f85479ac51891dbcb2fac8305236f156bada662398e35d53507cc5c4c5094f7bb7c979a47136249f9e7094dd652a1f9e5fb1c3a5f

  • SSDEEP

    768:OuKjfdT9IQzpWUBj2Tmo2qLmcvELhoPI4F5V3uRN0boPXqVuaCm85d6hhBDZ9Tj:OuafdT93O2qELjQ5V3ugbo/Ez6did9Tj

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

holefo2785-22820.portmap.host:22820

holefo2785-22820.portmap.host:6606

Mutex

Oma7kBAtvlxY

Attributes
  • delay

    3

  • install

    true

  • install_file

    discord.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      RuntimeBroker.exe

    • Size

      48KB

    • MD5

      f814cb9c71d35f8bd503b6d9949aca22

    • SHA1

      96cb19b70bbcab9627cc3c37a384287a1162dc7c

    • SHA256

      d5965c899e5413e91ab7b75669b35d6797b5462c64f99f217a4014e8e4deafbd

    • SHA512

      072b7a7cc5be22435d9c498f85479ac51891dbcb2fac8305236f156bada662398e35d53507cc5c4c5094f7bb7c979a47136249f9e7094dd652a1f9e5fb1c3a5f

    • SSDEEP

      768:OuKjfdT9IQzpWUBj2Tmo2qLmcvELhoPI4F5V3uRN0boPXqVuaCm85d6hhBDZ9Tj:OuafdT93O2qELjQ5V3ugbo/Ez6did9Tj

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks