General

  • Target

    1732-135-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    221125-zhz84sdh79

  • MD5

    41b3a78e228a3de81624cb3a68eee9ce

  • SHA1

    f6e919312051b0033ffc15c8b9ecbcbfe002e9cd

  • SHA256

    b0dd9ec010733f937857a99daa7c9a8a61dbde4b839a9eaa12e4605685a94288

  • SHA512

    7976bb44ceb67a703d1617e28a0d0f747211cc4d45efa058facb10b414db6db0f851f605281feff97c3796176fe853a1c4f48bff8ba281b8168364cabfaaaccf

  • SSDEEP

    768:Eq+s3pUtDILNCCa+DiPOt59/giUdA8YbBgelpul5gHvEgK/JDZVc6KN:Eq+AGtQOM6AzbuaC5InkJDZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

fghnmvhdf.duckdns.org:8026

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1732-135-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      41b3a78e228a3de81624cb3a68eee9ce

    • SHA1

      f6e919312051b0033ffc15c8b9ecbcbfe002e9cd

    • SHA256

      b0dd9ec010733f937857a99daa7c9a8a61dbde4b839a9eaa12e4605685a94288

    • SHA512

      7976bb44ceb67a703d1617e28a0d0f747211cc4d45efa058facb10b414db6db0f851f605281feff97c3796176fe853a1c4f48bff8ba281b8168364cabfaaaccf

    • SSDEEP

      768:Eq+s3pUtDILNCCa+DiPOt59/giUdA8YbBgelpul5gHvEgK/JDZVc6KN:Eq+AGtQOM6AzbuaC5InkJDZVclN

    Score
    1/10

MITRE ATT&CK Matrix

Tasks