General

  • Target

    bEva.exe

  • Size

    47KB

  • MD5

    b0fa59e21457916fa8855d4275ecc73d

  • SHA1

    1711144d4d28eb910b65180f367fad1ee823b07d

  • SHA256

    627b7c9576e2d1b6316438f80ed8f6da58a0f48fb5b09361510a2e29b95e1a22

  • SHA512

    5c965ae1c95ec311f0d54213cdea5773321a38c000d4f5d9dd323ff278cfe2b2ca16ce23df01db50737d90f2b8544856b0e79a3a83db01c96665fb07b835bc3b

  • SSDEEP

    768:wq+s3pUtDILNCCa+DikFZdgrcqis+8YbLgesIBqmvEgK/J3ZVc6KN:wq+AGtQOkirUzb0tIBqmnkJ3ZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

CR001

C2

4Mekey.myftp.biz:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • bEva.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections