General

  • Target

    file.exe

  • Size

    45KB

  • Sample

    250415-tfx33stvax

  • MD5

    73b24e046f0348e3ffc30398a8306a51

  • SHA1

    1d058188b3e194107fcde90e9c3a7762561bedd4

  • SHA256

    e031d5b9b47ac7d1ceabde5e77aa9555b7ca4603bf5f3195731922a677bf391b

  • SHA512

    19bb17f7a16e9ee799ff6523865da37aa474f2372b4ef0242dd4e7e0c7e71d7e96596758c6f9ef1cf925692263386e27345cec2d9a3bc383f4f1757e2ed6c3b5

  • SSDEEP

    768:puPfZTg4pYiWUU9jjmo2qrqAPB+luOJPISzjbWgX3iZ19p9UT7BDZ6x:puPfZTgKa21+UuOmS3bJXSZ19petd6x

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

cryptoghost.zapto.org:2000

Mutex

Dm4vMelJMBBG

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

latentbot

C2

cryptoghost.zapto.org

Targets

    • Target

      file.exe

    • Size

      45KB

    • MD5

      73b24e046f0348e3ffc30398a8306a51

    • SHA1

      1d058188b3e194107fcde90e9c3a7762561bedd4

    • SHA256

      e031d5b9b47ac7d1ceabde5e77aa9555b7ca4603bf5f3195731922a677bf391b

    • SHA512

      19bb17f7a16e9ee799ff6523865da37aa474f2372b4ef0242dd4e7e0c7e71d7e96596758c6f9ef1cf925692263386e27345cec2d9a3bc383f4f1757e2ed6c3b5

    • SSDEEP

      768:puPfZTg4pYiWUU9jjmo2qrqAPB+luOJPISzjbWgX3iZ19p9UT7BDZ6x:puPfZTgKa21+UuOmS3bJXSZ19petd6x

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

MITRE ATT&CK Enterprise v16

Tasks