General

  • Target

    2336-69-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    f3caaf0e3f0581d383a1437d69bf3809

  • SHA1

    b7e3a8bf85c046ca54e322022b2e2b4d096600f3

  • SHA256

    85f78b509b8e1891037c680362161b77a943c6b51fe95020d1885d904b3ce80e

  • SHA512

    cddf0c2fe816510863607797ed8d10bd76d4ad81892fed234394d4d3bd8f597e3ae4cc0844864b490b3399f8a1c858d6f0b8e772aa41c28a409189871e9d3a32

  • SSDEEP

    3072:3e8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTLwARE+WpC:v6ewwIwQJ6vKX0c5MlYZ0b2M

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot5837907114:AAHZZXaT-vmfmgCiNT6-Neq9GloKxvxzJ_8/sendMessage?chat_id=6163418482

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2336-69-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections