General

  • Target

    c69b81e6499b64d01ed7b231985f9061e8553309cbd64b00d1699e71d58fd4c3.zip

  • Size

    23KB

  • MD5

    304cdae5c6ba147b505f6b24798f16eb

  • SHA1

    cc05a7fe259410a573af014f34a4fdce22c4bd7d

  • SHA256

    cd331d42e2ecc66b8a2f7388bea49900940830292e1f902c8fabbb2d8acec213

  • SHA512

    cc8bd5917ccc4300656e1db4cf3de11bfacca5e710d6159871a51096bb8dbe99180dc8cdce46e8266a239ed217770c2f98cf6a3a52a3ae13a0d652c09efb329e

  • SSDEEP

    384:jV/9KDaLvz7xo+PPlFrfnrV5sVcBDEvOZZUJmUOS6HpKBDoSE1Cu7ndM0HWC0wIc:jp9Jvnxo+HlVfnrV5sawGE/OdKvE1RnD

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8809

thebest39393.ddns.net:8809

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    Microsoft Services.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • c69b81e6499b64d01ed7b231985f9061e8553309cbd64b00d1699e71d58fd4c3.zip
    .zip

    Password: infected

  • c69b81e6499b64d01ed7b231985f9061e8553309cbd64b00d1699e71d58fd4c3.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections