General

  • Target

    532-234-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    ae2c10afceb71583e7f745e1e9268de7

  • SHA1

    c402dd56a25f952ade58433b1a46d0439f5b5c43

  • SHA256

    b09a16f6ca2d5d6186ac55a7ef991bca00e9feb824361213d25c9f4a4a85e623

  • SHA512

    3a6bec6f363784c2c4c2dedc5752d16d9cfa311b2e469982d27b46613022a4aaa8ba803f39cb3a057acb9e8744cd834fe74c22defc355cfc9bccc6b6b3d2e56d

  • SSDEEP

    1536:liiNb8k5R50WMqCqKbw1tFL+OB9isiq7Dx:liit8k5R50LqKbwhL+O7+qXx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

newmekha

C2

pop11.linkpc.net:6606

pop11.linkpc.net:6666

pop11.linkpc.net:7707

pop11.linkpc.net:8808

198.244.206.24:6606

198.244.206.24:6666

198.244.206.24:7707

198.244.206.24:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 532-234-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections