General

  • Target

    1316-66-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    230508-kgvjxahg22

  • MD5

    cb702a3656274db3c372fb513bda4058

  • SHA1

    faa0cb683f296cb7a54ba85e38aea3feb10978e0

  • SHA256

    91301d384f9f6a0d48beae7aac8e2808df3b1e112e4537ef1c206add707acf83

  • SHA512

    df6d2c6b055a6ed3b89ba723a447d9475ad0edde3b894cf2d9c1213c36c5bc40d5cf3a8d5c4306a0e4cd11b01ce4272db035c74ac6930532bd55c1901892a410

  • SSDEEP

    768:vuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3imk6jeuS8+engBDZ:vuwCfTgp/2OKYDy3bCXSmk6JX2d

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

37.120.210.219:48408

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1316-66-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      cb702a3656274db3c372fb513bda4058

    • SHA1

      faa0cb683f296cb7a54ba85e38aea3feb10978e0

    • SHA256

      91301d384f9f6a0d48beae7aac8e2808df3b1e112e4537ef1c206add707acf83

    • SHA512

      df6d2c6b055a6ed3b89ba723a447d9475ad0edde3b894cf2d9c1213c36c5bc40d5cf3a8d5c4306a0e4cd11b01ce4272db035c74ac6930532bd55c1901892a410

    • SSDEEP

      768:vuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3imk6jeuS8+engBDZ:vuwCfTgp/2OKYDy3bCXSmk6JX2d

    Score
    1/10

MITRE ATT&CK Matrix

Tasks