General

  • Target

    4332-154-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • Sample

    221101-kyhaxaaae2

  • MD5

    9fb1b0d245ea10621fb05dff7e12f0b0

  • SHA1

    73fb5f58112055a447e8c1e444539151e1ccb2a5

  • SHA256

    79b616f6f007c51875871be0c329618b2efbe9511d2ddacd3a3559a9947ba0cd

  • SHA512

    da3fbdfb321725114ec8a6a3956b904eb6d55d148703888b95a44bf4dbedb7b7a582e811d6b1b784828a1974d711a42bb0e6b230d98b93a571b123c8ff7ff731

  • SSDEEP

    1536:wwHa95Lv4GBu6cxH6Gs+5/FI6abnbgK5+/VbjVtK9/x:wwHa95Lv4Uu6cxH6G5a6anbR50ppYdx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

23-09

C2

mo1010.duckdns.org:2020

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4332-154-0x0000000000400000-0x0000000000414000-memory.dmp

    • Size

      80KB

    • MD5

      9fb1b0d245ea10621fb05dff7e12f0b0

    • SHA1

      73fb5f58112055a447e8c1e444539151e1ccb2a5

    • SHA256

      79b616f6f007c51875871be0c329618b2efbe9511d2ddacd3a3559a9947ba0cd

    • SHA512

      da3fbdfb321725114ec8a6a3956b904eb6d55d148703888b95a44bf4dbedb7b7a582e811d6b1b784828a1974d711a42bb0e6b230d98b93a571b123c8ff7ff731

    • SSDEEP

      1536:wwHa95Lv4GBu6cxH6Gs+5/FI6abnbgK5+/VbjVtK9/x:wwHa95Lv4Uu6cxH6G5a6anbR50ppYdx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks