General

  • Target

    NEAS.9d8f412d4981853393480c17f884d160c8a8877728644782bfb2fdd7faecccd5exe_JC.exe

  • Size

    65KB

  • MD5

    c24a8a9088d3cdbb48d0603eb0f6f057

  • SHA1

    dcf339e2700380a06bc6ce66e1b56f39322f9bf2

  • SHA256

    9d8f412d4981853393480c17f884d160c8a8877728644782bfb2fdd7faecccd5

  • SHA512

    ca62f47e7b77862715038277d6925c0604b3ee786dd0f848cb5489534f512a3c6a6f4f9ad134be50aa0479ed1ed33af66d2ad36c6778daa174b9755072ff5936

  • SSDEEP

    1536:/e2UkM9DZk1nukMPaoljhSnOuVw8hE8PU6a15DGQVM6bOS+FbgRE/Yn8roTRBx:W2UkM9DZkFE8PU6a1xGQVM6bO1lA82rx

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

DOX NEW RAT

C2

dox2022.homeip.net:4444

Mutex

AsyncMutex_doxnewback43

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.9d8f412d4981853393480c17f884d160c8a8877728644782bfb2fdd7faecccd5exe_JC.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections