General

  • Target

    e4be2ae586aa74b5ff7bf0166ae2b1cdb4d4ac8b612157d675e305dcc42b8d06

  • Size

    45KB

  • Sample

    250421-x6dc5ssyav

  • MD5

    e00b88ce9bb80f4c86ca1c67da83e17d

  • SHA1

    0e00c59aa9f8db1b3be212c3867fcec9245254e8

  • SHA256

    e4be2ae586aa74b5ff7bf0166ae2b1cdb4d4ac8b612157d675e305dcc42b8d06

  • SHA512

    dbd463b74733fcb6854b30addf77858d6d8214bf3498ac811b29361fbe50548f55f9eeecc41b2be67537897f56d96b1d6f2662fab29b83145a6c7d588335002d

  • SSDEEP

    768:Ju6XdTvER+SWUk6P4mo2qbEKjPGaG6PIyzjbFgX3iMIfd0wxiABDZLl:Ju6XdTv2S2RKTkDy3bCXSMIF0wUWdLl

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

10.81.36.45:6606

Mutex

LfKMo3uFrnKq

Attributes
  • delay

    3

  • install

    true

  • install_file

    test.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      e4be2ae586aa74b5ff7bf0166ae2b1cdb4d4ac8b612157d675e305dcc42b8d06

    • Size

      45KB

    • MD5

      e00b88ce9bb80f4c86ca1c67da83e17d

    • SHA1

      0e00c59aa9f8db1b3be212c3867fcec9245254e8

    • SHA256

      e4be2ae586aa74b5ff7bf0166ae2b1cdb4d4ac8b612157d675e305dcc42b8d06

    • SHA512

      dbd463b74733fcb6854b30addf77858d6d8214bf3498ac811b29361fbe50548f55f9eeecc41b2be67537897f56d96b1d6f2662fab29b83145a6c7d588335002d

    • SSDEEP

      768:Ju6XdTvER+SWUk6P4mo2qbEKjPGaG6PIyzjbFgX3iMIfd0wxiABDZLl:Ju6XdTv2S2RKTkDy3bCXSMIF0wUWdLl

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v16

Tasks