General

  • Target

    4228-15-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    231011-tf9f4she3t

  • MD5

    0eb26c0594096161f4f9f1d6798d439d

  • SHA1

    2d9dd0f45ea77d1e80b7df0d17161babbb066c98

  • SHA256

    5b6b2d78188488ad2ca577191b05169a07eb77de5dc03b1dadb9bcb98f55b543

  • SHA512

    6b2c022735311dd798998fd1d4f7f10e561b47fff6b0d69050458adcb669fa118743102d3ef6e6d5ec7b99224514ee157268f04fee6b13c5004153c32f67d5ab

  • SSDEEP

    1536:OmfWSqHdykrVMKuJUYFG8/I7wS8qejbJgySL8Gs1vrmTG9x:OmeSqHdykGKuJUYFu7wS8qEbJZ1vEWx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Os-Shark

C2

osostata.com:5555

Mutex

AsyncMutex_juyku78k

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4228-15-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      0eb26c0594096161f4f9f1d6798d439d

    • SHA1

      2d9dd0f45ea77d1e80b7df0d17161babbb066c98

    • SHA256

      5b6b2d78188488ad2ca577191b05169a07eb77de5dc03b1dadb9bcb98f55b543

    • SHA512

      6b2c022735311dd798998fd1d4f7f10e561b47fff6b0d69050458adcb669fa118743102d3ef6e6d5ec7b99224514ee157268f04fee6b13c5004153c32f67d5ab

    • SSDEEP

      1536:OmfWSqHdykrVMKuJUYFG8/I7wS8qejbJgySL8Gs1vrmTG9x:OmeSqHdykGKuJUYFu7wS8qEbJZ1vEWx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks