General

  • Target

    5692-664-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    3abf661f3a739fad4e8c53f37ab8b844

  • SHA1

    f9085cc2ef987785a15b739422a4e25e9a014d21

  • SHA256

    6a7bdf9b5f317d88eaea763aff1d52020e21962975bed52852c35df6287f38b7

  • SHA512

    dfee7b0e2e598fb451523a4cea2d11b666cd34f6e946cd7965cfb510618b3ff2b24a2813256d8646c3e1ddb3276172dc871eba8c87906841bfe2c195d99c97fa

  • SSDEEP

    768:YuQ6NTREhzxrWUXWm5mo2q7e1p3PwPIUpPRG0b844YZR0R/KBI7XvBDZyw:YuQ6NTR+J2J3dUpPbb84tfK/pdyw

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

SecurityDefenderProtokol

C2

88.248.18.120:33918

Mutex

SecurityDefenderProtokol

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityDefenderProtokol.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 5692-664-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections