General

  • Target

    1924-59-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    57b3052a6085808b04cce3f7ac058650

  • SHA1

    67e0ee2da0be254ad9db589f49337096bfc31b70

  • SHA256

    ecc2c0d870c267b642b3236f4b2446ff5228a7d5e8f5899f1daed8ad451fd951

  • SHA512

    51365b5ca8f676af51e70efc0b7414ddfc4fa4533a466bb579dad3fde10d96eda7fd0713be911315c8d3412a3ce406ced2d5a00ab5a9a17a97966e0ffb6e046d

  • SSDEEP

    768:nukjVT0kLd3WULgPdVmo2qDnUPItmOFPIvzjblgX3i7Q+e9D4fqetLBDZ:nukjVT0Mq12cHmOCv3biXSE+xfptdd

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

lux

C2

asnyc2020.ddns.net:2119

Mutex

kPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    systme.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 1924-59-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections