General

  • Target

    Payment-win64-payload.exe

  • Size

    60KB

  • MD5

    98d40351ffefdc77c1ae288ebf717462

  • SHA1

    76fbce599f9ba032de95eb1538f653f641021aea

  • SHA256

    9ea0227fe34a921ea91ee6780651f62011d3a17a67df57e22afeb4efb7ba75f4

  • SHA512

    cb3e6a6cdf2c0fc2032ea7786278e068eb3ac10fac3e1f86f5c8a0c03769e781f1bd7841cda7050caace03c28feb3c0bacfde2216cb7636b72abbf1759289787

  • SSDEEP

    1536:X780qSZv/QxIlB0SmyK5ggLN7bASwujNJNWPcKXAx:X3qSZvoxoB0SmH5X57bAgJQrQx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Thor

C2

peakypinkers.duckdns.org:65

Mutex

AsyncMutex_edu

Attributes
  • delay

    3

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • Payment-win64-payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections