General

  • Target

    c5a1c573f399e60294a6c9cc4f5795b2.bin

  • Size

    22KB

  • MD5

    2b188db37b642384a3375dbccc94c834

  • SHA1

    a3e8981b82367a815eab6077fe1993a687e8c2bf

  • SHA256

    a648a07c0ca551b5e645f90e2ec783a130969730a9e551487402374fa8801110

  • SHA512

    65d1e8fff242a1c0c53226ebcbf7c4d65b2c823e1dc3b73f617513541bb3d374936f9b4d2e3887497f3e168d3a9dbd0a31a678ffccbf555947391626843d9e41

  • SSDEEP

    384:oNqxG5YYP6HWCB9gnJAer7qeHOP400uYsc46S/CtQ3GAzRB40hbI4Sq/FvALUCZ+:pxGbQ9gnJyDQ1jlFoRBvtSq/yJctQa

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

jajo0.ddns.net:2410

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c5a1c573f399e60294a6c9cc4f5795b2.bin
    .zip

    Password: infected

  • f316db30e3a572b84f35cf5317c83078eeca9e61c9e954763278758d43d340e0.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections