General

  • Target

    4896-2011-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    dc2d754d2a6c26756906961b46525361

  • SHA1

    9b8fe4cb5d61d670f01ede34625ad8666cc3638c

  • SHA256

    529de828727b879c579dfdb8cdce81a6afcba2172695447f279bbb3ce3552d07

  • SHA512

    e18e9809fbe46e8b240895345308eb7fbedcc58e5a56f810d0189165f4a907e94f39a18f698fc490bd63b66544343eb03df716871d3cf0a963e63e3e97ecf87c

  • SSDEEP

    1536:wugKNToTdQT2O/rdCayk5bfywhTy952CPddtH:wuguToZS2kCayAbfpQlH

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

System Guard Runtime

C2

85.105.88.221:2531

Mutex

System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    System Guard Runtime

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 4896-2011-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections