General

  • Target

    1732-59-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    221208-vdaqfaae67

  • MD5

    5b9bbd21f414d45e77a1e4f4a8c18b2e

  • SHA1

    7d0fded7e8481f8aad58f7825b3dce7d8e3d4920

  • SHA256

    ab9e59823606ab4a7832ce7980074a15bb5ed73d7ca1e14770f3bd9f79025d18

  • SHA512

    3b332a6d2a1797b6656f88a243e7282507133ed80001e2849e3aa4ac77f78af19b2166fd4bfdc4bc53f8d3cff7b33c89485ea9ed53ec05cb78fda628e3a273c0

  • SSDEEP

    768:fu1a21T3EiJfWUzuydmo2qzPUPItmOFPIvzjblgX3ixjbM4C0ju0oc2fzBDZ:fu1a21T3xN2kHmOCv3biXSx3LVd2dd

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

luxy2sdds

C2

asnyc2020.ddns.net:2119

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    systme.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1732-59-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      5b9bbd21f414d45e77a1e4f4a8c18b2e

    • SHA1

      7d0fded7e8481f8aad58f7825b3dce7d8e3d4920

    • SHA256

      ab9e59823606ab4a7832ce7980074a15bb5ed73d7ca1e14770f3bd9f79025d18

    • SHA512

      3b332a6d2a1797b6656f88a243e7282507133ed80001e2849e3aa4ac77f78af19b2166fd4bfdc4bc53f8d3cff7b33c89485ea9ed53ec05cb78fda628e3a273c0

    • SSDEEP

      768:fu1a21T3EiJfWUzuydmo2qzPUPItmOFPIvzjblgX3ixjbM4C0ju0oc2fzBDZ:fu1a21T3xN2kHmOCv3biXSx3LVd2dd

    Score
    1/10

MITRE ATT&CK Matrix

Tasks