General

  • Target

    536-4617-0x0000000000400000-0x000000000051C000-memory.dmp

  • Size

    1.1MB

  • MD5

    88dd408320c53d79bffc9fc98da37a9b

  • SHA1

    b292da55245cc4a118987a2ac4649522a8775627

  • SHA256

    5e4c459a764e7818f84feb12014666a102747b8243b7395dbcdfd557e8437014

  • SHA512

    95f8dcf2ab7e2d224a766316ac5a13e334b25d7dd42cbef741a984ab89bf66b964c28bab2c999fe56eea2484eed987a323d78b6734ecc02b84ccf6b6d84d2ab2

  • SSDEEP

    24576:3k2yETiWOxHM3RlyqYKbkZTN69HBaIj+HRtwpHERZ4OvG:bKVM3RluKbkC7j+HRmuZO

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

火绒企业版远程管理软件

Botnet

默认

C2

asdasud.xyz:8848

Mutex

域名

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 536-4617-0x0000000000400000-0x000000000051C000-memory.dmp
    .exe windows x86

    32c5de998b5f069b26c94c8143b13c06


    Headers

    Imports

    Sections