General

  • Target

    920-60-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    fbf5b38ec9918711a5d4d41231545322

  • SHA1

    5a77593184cb2623857513de944e4bc8a06af079

  • SHA256

    d2d9d47feecf314a90e289a3186e9b3744141224db0070f9a7e0c07e7b281e15

  • SHA512

    9b057cdd4d5ed4c84d99ac451c8e70e1981693d3527476a17337f578eba01a222c6f39c1f7bfa3eccf0caec8805ee78a55d0c7af30436e442e1885993af62eba

  • SSDEEP

    768:YuQ6NTREhzxrWUXWm5mo2q7e1p3PwPIUpPRG0b844YZR0R/KBI7XvBDZ:YuQ6NTR+J2J3dUpPbb84tfK/pd

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

SecurityDefenderProtokol

C2

88.248.18.120:33918

Mutex

SecurityDefenderProtokol

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityDefenderProtokol.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 920-60-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections