General

  • Target

    3672-173-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    230501-gbsatage31

  • MD5

    6aa676216812a2c798808e0fe59f1324

  • SHA1

    d810e1777fd3a83cf09c2baab8bf4e6ead24f015

  • SHA256

    30fd9e61ee0a853865714d6433b7590525f7b53b6f0815a0331420129151e7c1

  • SHA512

    b2aa07c49d1f3b64c811f911c03886367cff0a857da2865b252c328a4456d104bf41c83e6ce7d6e035d311c6adbc1da76455d1b964816c7a2dd5bbf738b0ccd3

  • SSDEEP

    1536:M2wukvF1ak9gcKu5UYFLrsxobD/BuGUu2wNLVrQTGtx:M2dkvF1ak9Ku5UYFYobDeu2GLVGmx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

Modyhr.ddnsfree.com:6606

Modyhr.ddnsfree.com:7707

Modyhr.ddnsfree.com:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3672-173-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      6aa676216812a2c798808e0fe59f1324

    • SHA1

      d810e1777fd3a83cf09c2baab8bf4e6ead24f015

    • SHA256

      30fd9e61ee0a853865714d6433b7590525f7b53b6f0815a0331420129151e7c1

    • SHA512

      b2aa07c49d1f3b64c811f911c03886367cff0a857da2865b252c328a4456d104bf41c83e6ce7d6e035d311c6adbc1da76455d1b964816c7a2dd5bbf738b0ccd3

    • SSDEEP

      1536:M2wukvF1ak9gcKu5UYFLrsxobD/BuGUu2wNLVrQTGtx:M2dkvF1ak9Ku5UYFYobDeu2GLVGmx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks