General

  • Target

    bLLa.exe

  • Size

    63KB

  • MD5

    15b1e4daf575c9048aea3bb18b21606c

  • SHA1

    ab9f3e0c167fcc4270fcf5489333a652c6cff041

  • SHA256

    5f69e57505862bfe9efc097de17ffa99c93eedb60e86b073cbe494b00a2d9a37

  • SHA512

    c490e149a1b2006a523dc3ce3bd5fa6048f8de8638dd26f0ce9301fb0468b9dc4f82fdca83f76cab095264e9674da797ccaecd56deb771397e04f244568c0e76

  • SSDEEP

    1536:HhYBLTM3Ufc4c7VGeeiMl8GbbXwoZHtGZZVclN:HhYBLTM3UfcVVfeFmGbbXzGzY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/q7n3RpBv

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • bLLa.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections