General

  • Target

    1716-63-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    221014-e9rqtsgeem

  • MD5

    e734da2823a0ec769009969ae4cb5a97

  • SHA1

    828daa95fcd99c0094a828da8b4d34c5faa4630d

  • SHA256

    14b003d7ab79f9711f506e44379868013a0b2c71f7c915b5eaa17e59374aa51d

  • SHA512

    b690166a1ef514605d56fac9d8417f081bd539409b22f3ecefc1c3ca7c24226760cb283f0f7ee8e8b8c5e29d9ea5007479da9c2ed9f496b693e6208d5306677e

  • SSDEEP

    768:o+qFpfbX3EROLukOicvHk3eHlWMPbPgF0qM0UDlGQ0BxwaUYI6OC:o+zOaXvZH0ub4FrM0qGQ0Bxw/6O

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.6A

C2

dgorijan20785.hopto.org:6606

dgorijan20785.hopto.org:7707

dgorijan20785.hopto.org:8808

Mutex

servtle28477

Attributes
  • delay

    5

  • install

    false

  • install_file

    wintskl.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1716-63-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      e734da2823a0ec769009969ae4cb5a97

    • SHA1

      828daa95fcd99c0094a828da8b4d34c5faa4630d

    • SHA256

      14b003d7ab79f9711f506e44379868013a0b2c71f7c915b5eaa17e59374aa51d

    • SHA512

      b690166a1ef514605d56fac9d8417f081bd539409b22f3ecefc1c3ca7c24226760cb283f0f7ee8e8b8c5e29d9ea5007479da9c2ed9f496b693e6208d5306677e

    • SSDEEP

      768:o+qFpfbX3EROLukOicvHk3eHlWMPbPgF0qM0UDlGQ0BxwaUYI6OC:o+zOaXvZH0ub4FrM0qGQ0Bxw/6O

    Score
    1/10

MITRE ATT&CK Matrix

Tasks