General

  • Target

    ffbeb794c83fccbeea2f4c069.bin

  • Size

    23KB

  • MD5

    a8b5ebfa797c6d765bfce4dadaa51665

  • SHA1

    c164f81c10f9166470da912d209742783ce766ca

  • SHA256

    6a2a3adb96a52b5aaaa5c01cf10703d0c494fe7a06455d0bdc6979fa7259a086

  • SHA512

    40dccd008777ecb5afa851c9d2a3b0eb72eef3f612813c6abd137a92da3ca53f60b58d32304934811169b5ebdcbcbc780e253654e6e34ec8f562c0b5a5c2a4a4

  • SSDEEP

    384:Y5715hQcm0Wd+0YSwqdNQb8xH1oJrV2uqMwkWWSzHoBLfm4TI4d0ea/ZzLcHOb+:Y7EpdlYKNQbIoJrjnWWOoy34mhmub+

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

26JUNIO-RODA

C2

20.200.63.2:2525

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ffbeb794c83fccbeea2f4c069.bin
    .zip

    Password: infected

  • 33e08bef26c140a0219a93a0604549a82f98aafdfe198e8a4e9c2bbdfece6e5e.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections