General

  • Target

    d3058cbe0cd1096f61f39ab206963aa81eca4d9d543b57a1182cc4d02540f7df.zip

  • Size

    81KB

  • MD5

    12d9a8727b435c0fb29839d00ab94263

  • SHA1

    4abcf1bb2c1e8e884049bb79ba22feb239d7034e

  • SHA256

    af91e0c5c04d95b3c9cf323592cede90f7b51facc0a7675603447cf81a7f832b

  • SHA512

    a192e6f7744d577149073b26760a319121431e012aaaad4b178edc14a3cd41372ed25a6cca16dcd35eb6b64bf0fc6467de50eef1aaf9a1e439bb09e68031546a

  • SSDEEP

    1536:hwca72Sawx0XmONDfMPTtLEeQIrnX66vxYn421SPC1SeZhHFyZPigqL:Gca7bawx0WONDE5LQIrqC+OPCMe/HENs

Malware Config

Extracted

Family

asyncrat

Version

HACKED TEAM

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6220812537:AAFPPCcmWEPO4DcIuvJK7QDwxh2MDMCBKAY/sendMessage?chat_id=2032608975

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • d3058cbe0cd1096f61f39ab206963aa81eca4d9d543b57a1182cc4d02540f7df.zip
    .zip

    Password: threatbook

  • d3058cbe0cd1096f61f39ab206963aa81eca4d9d543b57a1182cc4d02540f7df
    .exe windows x86

    Password: threatbook

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections