General

  • Target

    9c.exe

  • Size

    226KB

  • MD5

    53ddfe229bb020d36166edb9b5d722f8

  • SHA1

    f0035ce182a1c107ef8e08fa96ea22c558db8c18

  • SHA256

    9c98af46658c1d03d1befdb088719d324f3891f05c1a6b1b2ee436a5a5552ec4

  • SHA512

    24b1b279f8b90a185dd6ded087878ff83c61469b1266fec41276e2eb19ee6ac51089be7b02146f35364f7f567d3335746a7e6a4e57b460fb41b7f035e7daa6b1

  • SSDEEP

    3072:2+STW8djpN6izj8mZw9KalFI8OSyz6UbB2a9w7F9d16ug6+WpP:L8XN6W8mm0OUbwrFzg

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot5012120140:AAFYUA4Q8F0hkeg6HHkMOWhAJcA6-6lhzvc/sendMessage?chat_id=265371884

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9c.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections