General

  • Target

    3168-153-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    221207-jcgltaff26

  • MD5

    421be3b6e15b2e499c193beca18bf005

  • SHA1

    b43b35ca3026627a7c44bdc610ecba79e1d00944

  • SHA256

    29d7da2d1ecaf21b846b5655b33142b5c51e5e43992848ff3848ffa2bd79da55

  • SHA512

    cb49bab8273f0a023586471fb1612f3d3e3af2608e9853794f9b3cef4b1b19b1ae148cfe3760be003283b412bc362af8d604f421738f2264b6ba8007b02337e3

  • SSDEEP

    768:tU/6AHZfGeWn6mwsE2Z9YerlSg7TbmqE3+CJE1vxyxp70u7lsabsc2reFs41dGHC:t26UKVZnSSTyEvC70Ubb902H1dbbvx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

munroe.work.gd:6606

munroe.work.gd:7707

munroe.work.gd:8808

Mutex

AsyncMutex_fuck

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3168-153-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      421be3b6e15b2e499c193beca18bf005

    • SHA1

      b43b35ca3026627a7c44bdc610ecba79e1d00944

    • SHA256

      29d7da2d1ecaf21b846b5655b33142b5c51e5e43992848ff3848ffa2bd79da55

    • SHA512

      cb49bab8273f0a023586471fb1612f3d3e3af2608e9853794f9b3cef4b1b19b1ae148cfe3760be003283b412bc362af8d604f421738f2264b6ba8007b02337e3

    • SSDEEP

      768:tU/6AHZfGeWn6mwsE2Z9YerlSg7TbmqE3+CJE1vxyxp70u7lsabsc2reFs41dGHC:t26UKVZnSSTyEvC70Ubb902H1dbbvx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks