General

  • Target

    wnPTcjxF.exe

  • Size

    47KB

  • MD5

    a5fb5c7e81a27c6c3eae534f43a592b1

  • SHA1

    2cd9211fd8b7e677ecaa14653967e6f641f46ef0

  • SHA256

    5d7cd06f61d27d5b9820b0b9ce74f0d69a7eac63aebfc928e0fda7528b609877

  • SHA512

    bee8d0f6f691b2eb6346e9a53f5a045993686a788fe9ec18108f035c449bd6c4e6bf4cf1f612e945e39e486c6a91b169bb25374a8cf1049ee8e9594889761bbd

  • SSDEEP

    768:dOEuILWCKi+DiBtelDSN+iV08YbygeOW5+vEgK/J9lZVc6KN:dOtmBtKDs4zb1IUnkJ3ZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

4.tcp.ngrok.io:11354

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • wnPTcjxF.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections