General

  • Target

    Client.exe

  • Size

    47KB

  • MD5

    38c2615ac536a39dfd59effe08d8aa48

  • SHA1

    4e0051684ee8e0e8506f0961414239f47b9c5156

  • SHA256

    359bab8986ef9a3dc8ee0e8d5f2529d6db4f6646f711c23517e5597259553e6c

  • SHA512

    3beaf4136b9b06bcaed64e3fd939cecda32de37d1be0a3ff0ca4b43e5d54058095eacc3d82e6b4d10f1597d263215cdcb449a739ad4e4bf35dfd46234b4fe5db

  • SSDEEP

    768:IAUR8bIL+Cyq+DiZtelDSN+iV08YbygekdPAFoXo8vEgK/J/ZVc6KN:IPIeZtKDs4zb1JAFoXo8nkJ/ZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

V4

C2

de2.localto.net:41509

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    DSRHost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections