General

  • Target

    608-54-0x0000000001EE0000-0x0000000001EF4000-memory.dmp

  • Size

    80KB

  • MD5

    a74f01e0daf5321650002820780ab42a

  • SHA1

    aee8823e0f8d90dbb6c5477213929119f98588da

  • SHA256

    43482e5efc065366e188fd5245f36c33ff48f43894a5e910ef78794315c3ab40

  • SHA512

    485d152f63244f88ee64fb8775abe40e6bbc7541354c0c2a78ae19dc6fe35f7c1d7d8c4e7b66bea05732c9c56770b8dcb2e3aa1f7b4dcd9c1413dc479b5c2062

  • SSDEEP

    1536:fhjMxLDRwQuNMXbmaeCs2lERphCsd/GbbRwmYEhrGrtpqKmY7:fhjMxLDRwQuNMXbreKlOfCsRGbbR7hks

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.0.1

Botnet

Default

C2

7593352b2g.imdo.co:28870

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 608-54-0x0000000001EE0000-0x0000000001EF4000-memory.dmp
    .exe windows x64


    Headers

    Sections