General

  • Target

    996-62-0x00000000000B0000-0x00000000000C2000-memory.dmp

  • Size

    72KB

  • MD5

    526fb04d95e47fd87ea85dc5d330ae4a

  • SHA1

    7194a332fb066507deef598d8009338ad563924a

  • SHA256

    c88d1d7ad44f36af5f61747ff073eb6a6bc44b8ec9d9bcfa612851412a4de878

  • SHA512

    a8660e6912f705655d3c2e4261ae3614dfa5d314c65429a4a85eb04f28e695171902bb6005357a38b9f0a8fd0f262b71396a46af5bf4571cd1d17b78b2a3c6df

  • SSDEEP

    1536:wuwpFTA4I28UWqXIKB2bVmX7b3GZMokdWi:wuwvTA4I28U3XIKkbV0b3Sk4i

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

FileManager

C2

20.107.115.162:50239

Mutex

FileManager

Attributes
  • delay

    3

  • install

    false

  • install_file

    FileManager

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 996-62-0x00000000000B0000-0x00000000000C2000-memory.dmp
    .exe windows x86


    Headers

    Sections