General

  • Target

    1276-143-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    221003-fqh51sadcq

  • MD5

    e222c8f79d8ae5da1341401f4a90b47d

  • SHA1

    a57bcca91f3d69616d8460a18d8927d99ce0e09f

  • SHA256

    fae233a33f74a003f21032bc916783a6b528716f32e09f683b1556b85a44ab8b

  • SHA512

    9637e2efdad0fbe14e3d0b1e28b3e975d70851529b63d4105628e427b4c50dde9a7a66b30b08636b269964be4c4ee0d1d62c846585c9d9a42e9473d421d4d9a8

  • SSDEEP

    768:XuYK9T3kH1jWUvmqRmo2qbN9aIpePIhzjbFgX3icvhf0yMqoFBDZPx:XuYK9T34l22Fnh3bCXScSy6LdPx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

fresh02.ddns.net:2245

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    logs.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1276-143-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      e222c8f79d8ae5da1341401f4a90b47d

    • SHA1

      a57bcca91f3d69616d8460a18d8927d99ce0e09f

    • SHA256

      fae233a33f74a003f21032bc916783a6b528716f32e09f683b1556b85a44ab8b

    • SHA512

      9637e2efdad0fbe14e3d0b1e28b3e975d70851529b63d4105628e427b4c50dde9a7a66b30b08636b269964be4c4ee0d1d62c846585c9d9a42e9473d421d4d9a8

    • SSDEEP

      768:XuYK9T3kH1jWUvmqRmo2qbN9aIpePIhzjbFgX3icvhf0yMqoFBDZPx:XuYK9T34l22Fnh3bCXScSy6LdPx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks