General

  • Target

    2444-533-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    230225-s7tz3adf58

  • MD5

    524c301120b23ed492fa67f6f0bebc66

  • SHA1

    e21331ace2e9fa3e6b3caacc6cbfc979c203b094

  • SHA256

    b41277306a9a7580fea7ef0d0bef92b83120e662bc3eb7b2794ba8613f3c2d7c

  • SHA512

    f266fef72b29a35d8b9197f93b0c713cf59ae5e35b6392949649ecc632c16095bebc91b9abd78a4a04649d2f9f27b99e3e3c76325c944aa353bbd60ab3c60d58

  • SSDEEP

    768:RD+q7EILuCCj+DiJOsebKAiLQ8YbYgvf1e0JvEgK/JkwVc6KN:p+vrJGKwzbP00JnkJkwVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

WindowsDefenderSmarttScreen

C2

217.64.31.3:9742

Mutex

WindowsDefenderSmarttScreen

Attributes
  • delay

    1

  • install

    false

  • install_file

    WindowsDefenderSmarttScreen.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2444-533-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      524c301120b23ed492fa67f6f0bebc66

    • SHA1

      e21331ace2e9fa3e6b3caacc6cbfc979c203b094

    • SHA256

      b41277306a9a7580fea7ef0d0bef92b83120e662bc3eb7b2794ba8613f3c2d7c

    • SHA512

      f266fef72b29a35d8b9197f93b0c713cf59ae5e35b6392949649ecc632c16095bebc91b9abd78a4a04649d2f9f27b99e3e3c76325c944aa353bbd60ab3c60d58

    • SSDEEP

      768:RD+q7EILuCCj+DiJOsebKAiLQ8YbYgvf1e0JvEgK/JkwVc6KN:p+vrJGKwzbP00JnkJkwVclN

    Score
    1/10

MITRE ATT&CK Matrix

Tasks