General

  • Target

    5036-155-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    4684724182a86814c6383c96af1150d2

  • SHA1

    7dd0f1f67a51973169b8037778e5ed228519cd2d

  • SHA256

    33d24a79f022ab47ac89a9ab569579f8014ab50456996d947107c737e33d6dfc

  • SHA512

    f99c827c8d79d608237a5e95d3c2cb5a17f48233e38eba75c0048f5c6178a1b6cddaa003f77e7e3af50adbfbbaff70e06ada5acf1c042de8fe2725eec676254c

  • SSDEEP

    1536:v2UukvF1tkk/hEYRo2NQphePvUgcKu5UYF5KzUWudRj5sjsjObUu/+tfPQNnr/rR:v2JkvF1tkXKu5UYF5KzhuDj5sjIObUlE

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

mikedonohue.kozow.com:30305

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5036-155-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows x86


    Headers

    Sections