General

  • Target

    3676-234-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    230323-g8rqjsga21

  • MD5

    6933ba4d21731302f8df4c43859c7875

  • SHA1

    88046f77aadd43eeea2f76225776c21b0e3822c0

  • SHA256

    3daf466fc00e8676930f5eea2d31982b6f569e560fe019dfc685cf470430fdc2

  • SHA512

    4fcb11c585f559e2be036eaa3b6986cee7ef564c1def91f1a47f672f4362a71355c76aaf634b011c735a275e99380a490429cd5649c4bff35b0eebf24caab437

  • SSDEEP

    1536:FnKDtaNvPmM5O3PZY3/tgiobIg1O1vWQq7Mx:FnKYNvOM5OBY3V4bI31v/qIx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Cairo

C2

admincairo.linkpc.net:7707

Mutex

AsyncMutex_move

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3676-234-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      6933ba4d21731302f8df4c43859c7875

    • SHA1

      88046f77aadd43eeea2f76225776c21b0e3822c0

    • SHA256

      3daf466fc00e8676930f5eea2d31982b6f569e560fe019dfc685cf470430fdc2

    • SHA512

      4fcb11c585f559e2be036eaa3b6986cee7ef564c1def91f1a47f672f4362a71355c76aaf634b011c735a275e99380a490429cd5649c4bff35b0eebf24caab437

    • SSDEEP

      1536:FnKDtaNvPmM5O3PZY3/tgiobIg1O1vWQq7Mx:FnKYNvOM5OBY3V4bI31v/qIx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks