General

  • Target

    4452-7-0x0000020DAD720000-0x0000020DAD734000-memory.dmp

  • Size

    80KB

  • MD5

    78cedf3eb99284b415a28cfde3c8ff45

  • SHA1

    2ad572ade9f1f6c3d5664ce24ac871942616cfee

  • SHA256

    e6a493b0b0bf454a7dd370a87c3688c9a18c7d9282999f48af7a4806a7c80d35

  • SHA512

    0e3f02f7f517f543456b59bc0908b3d96aa88bd78c4d62f3b5a0ba6dc2260bbbaf732995298acda459e8b1e869e1b1db9cb7e717b61d8b1ea7d3350a097c4e3e

  • SSDEEP

    1536:tKlcUFiZ5kYBCugVbg1tjwFKQaKm1qAKE8q7Dx:tKlcUFiZ5k4CugVbg3oaKJAKE8qXx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Cracked By Hegaa

Botnet

XXNEWWXX

C2

webwdircetcc.sytes.net:3232

webazssc.sytes.net:3232

webazsswebc.sytes.net:3232

webwsetcc.sytes.net:3232

Mutex

中文翻译缅甸语翻译缅甸语

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4452-7-0x0000020DAD720000-0x0000020DAD734000-memory.dmp
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections