General

  • Target

    2560-173-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    e79e05472690d3ce35cdbad536de2081

  • SHA1

    e17bae40ed40bda9a15f3a7a8b5a29ad7b68efa8

  • SHA256

    bb613a5fcbe5f029c00418aafde15d4063c1a624232f7f3217f1e57b31aac5b6

  • SHA512

    56674eb8f0e215e9915ffac792ecfe36f42b474025d67c079dcb5ecc687f9ccc38facc2bcf03cfc856654a58fa44b781b6b300b6cb910837cf8d1389f5d1b855

  • SSDEEP

    1536:3m3uSa/d5kaWAeuIR7RYmIFU0IVMKuJUYFRjosuDY8bKKIBtX84pPi5rWrClx:3m+Sa/d5kcKuJUYFV9aDbKKIBG4pq58o

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

xavierat.ddnsfree.com:6606

xavierat.ddnsfree.com:7707

xavierat.ddnsfree.com:8808

Mutex

AsyncMutex_hdtf

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-173-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows x86


    Headers

    Sections