General

  • Target

    5032-159-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    0596342c1923683dd8eddc59d0310306

  • SHA1

    54a3fd1c26a36fc122d50b7716b68745ec1cba20

  • SHA256

    a23c0ff1ab281ad477e489406146dedebf764ae52b29f5b600dfc5fe430f86c8

  • SHA512

    13bf6455603de4796fb2d76524dfeb249f5688054b6c1d759f1990aa60efa366f6b5c97f170cc44df1598bfc436c6f63b1064b60308c533b816c45287342f215

  • SSDEEP

    1536:5uGyogdxeYIQQqJAiCiywbjsENpf8quLbox:5uGyogdxeYIQxXCinbjxpfWLcx

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Error_95802AG

C2

sdf65dsf5df4dfs5555e8.ooguy.com:5001

westernogetobarsbrmng.ooguy.com:5001

Mutex

Error_589ERD5V

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 5032-159-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows x86


    Headers

    Sections