General

  • Target

    1936-188-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • Sample

    230322-zmtl5adc3v

  • MD5

    c1317a05a940b08fbce91f330d0196ff

  • SHA1

    14e155fea9d5fb10ff558c7101775c027fd7f4b7

  • SHA256

    06c120cae01be745d66f87303549789ee167024ca9048657c730e9c5c20c7212

  • SHA512

    cbca15a9d9c08ba5de5fa299e66d589328d8886fc8e172b05457a46e17db7450d5065bbbe0dce2d596d2a1fa9ec1be1fa9ad20273f2e6f347371c52936c907e7

  • SSDEEP

    1536:tvKDtKNvPmE5OMT3wLHmKb21tszqDq7Ex:tvK4NvOE5OMzwLGKb2vDqgx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

185.81.157.244:6601

Mutex

AsyncMutex_6S181I8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1936-188-0x0000000000400000-0x0000000000414000-memory.dmp

    • Size

      80KB

    • MD5

      c1317a05a940b08fbce91f330d0196ff

    • SHA1

      14e155fea9d5fb10ff558c7101775c027fd7f4b7

    • SHA256

      06c120cae01be745d66f87303549789ee167024ca9048657c730e9c5c20c7212

    • SHA512

      cbca15a9d9c08ba5de5fa299e66d589328d8886fc8e172b05457a46e17db7450d5065bbbe0dce2d596d2a1fa9ec1be1fa9ad20273f2e6f347371c52936c907e7

    • SSDEEP

      1536:tvKDtKNvPmE5OMT3wLHmKb21tszqDq7Ex:tvK4NvOE5OMzwLGKb2vDqgx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks