General

  • Target

    NEAS.88f4284bc8f0f23ab3b6c37b3c1ae3f04993af17c2b968900006960338898546exe_JC.exe

  • Size

    66KB

  • MD5

    3033cbe73ac8c164c2feb28d1c063d42

  • SHA1

    7a5522f7cd24d870bc3181672fdee71aa9bcb742

  • SHA256

    88f4284bc8f0f23ab3b6c37b3c1ae3f04993af17c2b968900006960338898546

  • SHA512

    f84568391bad11a950374cbe42b04e1ce117ec20700d758886fb501fabd6abb28e8744afce654fc6615470b6b04d42ebf676bbf614dc59fcc5fdc3eeff420efb

  • SSDEEP

    1536:o2wukvF1ak9gcKu5UYF8eWEnGrIbxwqIpCyWrQTGVx:o2dkvF1ak9Ku5UYF8egEbxwfWGex

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Levering

C2

foodie.ooguy.com:30305

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.88f4284bc8f0f23ab3b6c37b3c1ae3f04993af17c2b968900006960338898546exe_JC.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections