General

  • Target

    292-62-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    221207-jz8ntahd42

  • MD5

    1cec480f10e888638b2781d46225af1c

  • SHA1

    a9cc6c249a17b669b8c99b4f9d6797e968779811

  • SHA256

    949f3e260cc034b8f3b0be35f716e2764511e5a36c37d1e1672b622491dc2908

  • SHA512

    469cfea4c334ae5e09919279909596a5f98381c35768adebc461fa0d8bb499bc4896cd8f1218d2e67e379b9c2b60a1b7a28567d64784f1c4dc508122067528bd

  • SSDEEP

    1536:QhChLzRQA+dsHbp0G8QOFdPkKuUrsGoeMyGnGbbfwNAtkMV71G:QhChLzRQA+dsHbp0AOFdcMrscMvnGbb5

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

2.58.56.22:5211

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    Spoofer.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      292-62-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      1cec480f10e888638b2781d46225af1c

    • SHA1

      a9cc6c249a17b669b8c99b4f9d6797e968779811

    • SHA256

      949f3e260cc034b8f3b0be35f716e2764511e5a36c37d1e1672b622491dc2908

    • SHA512

      469cfea4c334ae5e09919279909596a5f98381c35768adebc461fa0d8bb499bc4896cd8f1218d2e67e379b9c2b60a1b7a28567d64784f1c4dc508122067528bd

    • SSDEEP

      1536:QhChLzRQA+dsHbp0G8QOFdPkKuUrsGoeMyGnGbbfwNAtkMV71G:QhChLzRQA+dsHbp0AOFdcMrscMvnGbb5

    Score
    1/10

MITRE ATT&CK Matrix

Tasks