General

  • Target

    1320-65-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    2d21243253c96a3416ea6eab6203f8a6

  • SHA1

    db43d53b33ce1fc7441af1be316a36ede50d7476

  • SHA256

    70dd77f314db5725c87342f5ec802bc519be7dc7f41987680fe54015413a1b48

  • SHA512

    db805c14225c092aa3bfdc1563e6f9f4001e89d4ca0c9626f475113cde3158e9a195e2204e8009360848a40608524285364497e5a95d705ef67f62a9abba1a1e

  • SSDEEP

    768:CuIYdTxJzlTWU/Wmhmo2qblyDj8lpnFePIGMpz4m40bf5k5p4ePDOF/3HcBDZ:CuIYdTxFp2+VLn1hpEcbf5l3F/qd

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

fresh03.ddns.net:45265

fresh03.ddns.net:34110

fresh03.ddns.net:2245

fresh01.ddns.net:45265

fresh01.ddns.net:34110

fresh01.ddns.net:2245

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    logs.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1320-65-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections