General

  • Target

    1204-60-0x0000000000470000-0x0000000000484000-memory.dmp

  • Size

    80KB

  • MD5

    5ae798a98ac4be9ec2821610aef21575

  • SHA1

    7f7b4d34b0336dd03453d39d9dfd1409a153bba6

  • SHA256

    29fdf2b42f60f30e50fd296f4dab72f2f64d748b184ccdbccad6b48be2dfbc49

  • SHA512

    9913c3905ebe8d690ea2677829249140afe9ed3c089b182deac1bf3a033f0ff4c40da68440e41d256be2707a0f4a5186a0926cb30f0e73c3fb0c75d868c5a4d1

  • SSDEEP

    1536:RvKDtKNvPmE5ObMqCqKbw1tHLJchaRWp7q7QxRN:RvK4NvOE5OYqKbwnihaR8qUxRN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Last_OsOs

C2

osostata.com:7777

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • 1204-60-0x0000000000470000-0x0000000000484000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections