General

  • Target

    d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc_JC.exe

  • Size

    47KB

  • MD5

    ccf16ec83b2e2d77d5d0e3c59a047b87

  • SHA1

    39090c8d6c19daf586017f31e620820e29594e3e

  • SHA256

    d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc

  • SHA512

    102fe145ecd8339be19647248c40edc4692248c6cdcf91f4119a68147c8d77728da626804435e6b5ade47e9896c30a4890ffdaecc0bfe2c98b8f8ee4dd143cc2

  • SSDEEP

    768:59umxLiIL1CaS+DivPg3ZEiq78YbkgeG6TsHb4KnvEgK/JXZVc6KN:59uAPWv8OzbryQHb4KnnkJXZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

27Jul

C2

tttmundo2022.eastus.cloudapp.azure.com:2225

Mutex

DcRatMutex_uuhrstr54645w3tr

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections