General
-
Target
aliexe.exe
-
Size
62KB
-
Sample
230701-jjxavaga56
-
MD5
63bf8f12fe0888f2ff1bde122aeca21f
-
SHA1
0aaffbdf45abc2cd919d32d19206bbbd04e56802
-
SHA256
ed7156a259cecc750c121faed21545185d9436de677556ef9e271e519073fb34
-
SHA512
3b75ef81b6911d3126ed2430554143f0801da7cc3e1d1685b3b2b677cacd4113cd9bd27cc98b83b5e78aea789a05c8b9d7fa6fc2b7a713d5db161079d78ef3e9
-
SSDEEP
768:rHrBQOGhV1Xj+IfxXiYo3PbE5HGfAp0IMeIcm7/RrabXFEY88phq73chWkq32WxK:rLKVFQY95mIaP1cyobXda7F2nq7wx
Behavioral task
behavioral1
Sample
aliexe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
aliexe.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
LEDGER MOHAMED POP
dynsys.is-a-guru.com:6606
dynsys.is-a-guru.com:7707
dynsys.is-a-guru.com:8808
AsyncMutex_g
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
aliexe.exe
-
Size
62KB
-
MD5
63bf8f12fe0888f2ff1bde122aeca21f
-
SHA1
0aaffbdf45abc2cd919d32d19206bbbd04e56802
-
SHA256
ed7156a259cecc750c121faed21545185d9436de677556ef9e271e519073fb34
-
SHA512
3b75ef81b6911d3126ed2430554143f0801da7cc3e1d1685b3b2b677cacd4113cd9bd27cc98b83b5e78aea789a05c8b9d7fa6fc2b7a713d5db161079d78ef3e9
-
SSDEEP
768:rHrBQOGhV1Xj+IfxXiYo3PbE5HGfAp0IMeIcm7/RrabXFEY88phq73chWkq32WxK:rLKVFQY95mIaP1cyobXda7F2nq7wx
Score10/10-
Async RAT payload
-
Drops file in System32 directory
-