General

  • Target

    shadow.exe

  • Size

    45KB

  • MD5

    b0c54754039e4c312c81cc1de388e1e6

  • SHA1

    c00e8d078f1224156e5f34720732891afe72d654

  • SHA256

    aa199fbb289e048c5abaa334be3eb172175cf53e736d3a15ca32549086c99a8c

  • SHA512

    c58117d3f377b6b7c1bba94d56049927a2a0e76e4243fa217ed8af1e80365939a5d3441572dea3c079403c07cad36ffebd35703e69fb258518244f2ca25d8bc8

  • SSDEEP

    768:DuU2VTwkbBHWU7TZcFmo2qjLKjGKG6PIyzjbFgX3i0ZHPcZekvlaBDZDx:DuU2VTwAJM2aKYDy3bCXS0ZC+dDx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

klept0wiz-33913.portmap.host:33913

Mutex

guaeiofj398ajgka340gka9wk3f09jq3ad

Attributes
  • delay

    3

  • install

    true

  • install_file

    Management.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • shadow.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections