General

  • Target

    4856-173-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    b6169e1770c0084eb83524ca28d297d4

  • SHA1

    63512e5d1c5f36d62f68b39f0b1fa4db4cf356ac

  • SHA256

    ce217805995eae4e24d39119816c4e2e506a4b55c3e0d55700d796ac672d390f

  • SHA512

    be7580261c87ab1589fbb5bb47390d85ddbbceb8165bd6b6faf95bd9daeb4ce72b306fd412d9cf45d0bff6308bd26414007af2b6c556d394f62959a9c71471f3

  • SSDEEP

    1536:12wukvF1ak9gcKu5UYFGGQZt3/PbqV2yfkZIrQTG9x:12dkvF1ak9Ku5UYFl+t3/Pbqh8ZIGWx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

josemonila.ddnsfree.com:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4856-173-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows x86


    Headers

    Sections