General

  • Target

    c69b81e6499b64d01ed7b231985f9061e8553309cbd64b00d1699e71d58fd4c3.zip

  • Size

    23KB

  • MD5

    dd6ed0bdd3708254ca1ed8ff78ca64fa

  • SHA1

    45075452f9aca4de608ccf044531eedbe09d79b9

  • SHA256

    7e99509d08819ab9c8e1e4dd16bd0e55060c63d6a71751848b2643c95647a77a

  • SHA512

    73ac8248d6fc2ba967f38f548d2f4f5e317d15d48bff2a38786f9e9f76ae3719fc9b99f30bdca7444b2f8d43328b0f65dcdc995688a4e4f71d48f437bd137a82

  • SSDEEP

    384:zUKTHYhL2tYC5T/Y4vzpq9BKC5ypXr0i1U89IWqH1A3xSfeiCd+hwRNzA3vs:X3b5LpGBkXrx7Z9ibm23k

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8809

thebest39393.ddns.net:8809

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    Microsoft Services.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • c69b81e6499b64d01ed7b231985f9061e8553309cbd64b00d1699e71d58fd4c3.zip
    .zip

    Password: infected

  • c69b81e6499b64d01ed7b231985f9061e8553309cbd64b00d1699e71d58fd4c3.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections