General
-
Target
123.exe
-
Size
2.7MB
-
Sample
230331-gllwsagf69
-
MD5
732dec385b880a8cca996aa49e009608
-
SHA1
546b512d13f2ca7e9a56c20ebcead7f1d9db4cbe
-
SHA256
de9f2f1d1927bdab4d37dcdd7b1bcfb7ef58b8b756e94dee35636002161f049d
-
SHA512
53e42ecaf680c0be1210f1e9c12d10a5063c6fa60c7551bc6b198f678ed1780b4434bc9e8564892583ecfa964569e91342d0d799b36bb4efdda971e466b3c569
-
SSDEEP
49152:NDlCNBphVPv2K7bTgfcrf/99dJaIVXI2RCWGFvMygeIwGT4kWeoN++tW3ljXhZ:NDleXTdNg70ivttmj
Static task
static1
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
123.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: ftp- Host:
45.151.135.235 - Port:
21 - Username:
123 - Password:
123
Extracted
asyncrat
162.14.197.20:8848
awdawdadadda
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
123.exe
-
Size
2.7MB
-
MD5
732dec385b880a8cca996aa49e009608
-
SHA1
546b512d13f2ca7e9a56c20ebcead7f1d9db4cbe
-
SHA256
de9f2f1d1927bdab4d37dcdd7b1bcfb7ef58b8b756e94dee35636002161f049d
-
SHA512
53e42ecaf680c0be1210f1e9c12d10a5063c6fa60c7551bc6b198f678ed1780b4434bc9e8564892583ecfa964569e91342d0d799b36bb4efdda971e466b3c569
-
SSDEEP
49152:NDlCNBphVPv2K7bTgfcrf/99dJaIVXI2RCWGFvMygeIwGT4kWeoN++tW3ljXhZ:NDleXTdNg70ivttmj
-
Async RAT payload
-