General

  • Target

    03fdb837e1130cd4e144fb0afcb67659.bin

  • Size

    23KB

  • MD5

    7164bb057a5aa4b5f9d923590b113b2c

  • SHA1

    d09a74c47bc8dedf8d974d2c1c7a7779f3b9b6c9

  • SHA256

    bbd129e8092d1fe50b711c7f99a9bf00ad11e2975b94a61a4224d7549da9a0b3

  • SHA512

    587e21418a0a06703fb64138b532049506d86549afad39c18693bc0ae635b8af09e3cfd6a3df2d214edec8fc9e87dd953dcef919a2f22464a33553315dc2a8f8

  • SSDEEP

    384:eW0ejBw24cDNLH4/e3pX1JUWhB+sTt9LCau4MMhAHMmopE9fHYDe/EwYE0l/7AWA:eW0yhLNLY/6lJ7+s5ZC1MhAHMVpE9yCz

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

vpsruso5JUNIO

C2

185.106.93.148:2020

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 03fdb837e1130cd4e144fb0afcb67659.bin
    .zip

    Password: infected

  • b5a07ffef279e824561d2fb7c6f3f8f2ce86f8fd407fd091820fa35f4dc3a99a.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections