General

  • Target

    2044-64-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    548b3cced8c9a59b6ed32ebcb7434310

  • SHA1

    0731bc26750ce9e396005031efec1e1c4d7ebe52

  • SHA256

    257c5c16e0ad73fa8f59161f5d8670511a40fcbaa54eab650c8f350571d70e31

  • SHA512

    31b46d6cb868b91ff6d9824c82a9506aad18cab9fd9179f630259865abbd43a11c49ffeed53e47618e425188878e68ed1659270530c4cc71dd6c0597e8a32183

  • SSDEEP

    1536:wugKNToTdQT2O/rdCayk5bfywhTy952CPddtH:wuguToZS2kCayAbfpQlH

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

System Guard Runtime

C2

85.105.88.221:2531

Mutex

System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    System Guard Runtime

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 2044-64-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections