General

  • Target

    2020-59-0x00000000000C0000-0x00000000000D6000-memory.dmp

  • Size

    88KB

  • MD5

    b228403fccc5f7b0a9eaad27c1147c3d

  • SHA1

    4d47f5a6617faf6d659140f7fb4007c846bcf838

  • SHA256

    63a87c98e0e28a94df51f8ec46297b9d891fdbbeffdd2b6d7754de1643d59b98

  • SHA512

    a869c2351139f427f4cc54d645b2db5071636180a8808efc225b69ab80dd9978171d18d8e6bf79c0f0b792aa4de6079fd6e182a702c3835aa7257dd2e3b353c1

  • SSDEEP

    1536:BBA73JlA0ZzeA+XDPteeiMl8GbbXwhdG:BBA73JlA0ZzeTDPQeFmGbbX6

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

iphanyi.edns.biz:3369

Mutex

Mtex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    windowss.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 2020-59-0x00000000000C0000-0x00000000000D6000-memory.dmp
    .exe windows x86


    Headers

    Sections