General

  • Target

    3220-14-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    0f32eff5cd28b1db9b2745563bff7aa2

  • SHA1

    487dd40f4f2dce5b7919e45d9ef388b9be59c33b

  • SHA256

    66bcb6106ed8b874cdc52515ec19ac7ab4dbd87caf5c099277839bbf3b35bc8b

  • SHA512

    e23ff39a3a80c4b86bf8a73e6030fc60d7d3f5bc2beb56f83af3286fb03c1ecf957c5dde107c0c88b94b248927ad73c248b7201fc627d500c73f03b629216d63

  • SSDEEP

    1536:o2wukvF1ak9gcKu5UYF8eWEnGrIbxwqIpCyWrQTGVx:o2dkvF1ak9Ku5UYF8egEbxwfWGex

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Levering

C2

foodie.ooguy.com:30305

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3220-14-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections