General

  • Target

    4228-15-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    0eb26c0594096161f4f9f1d6798d439d

  • SHA1

    2d9dd0f45ea77d1e80b7df0d17161babbb066c98

  • SHA256

    5b6b2d78188488ad2ca577191b05169a07eb77de5dc03b1dadb9bcb98f55b543

  • SHA512

    6b2c022735311dd798998fd1d4f7f10e561b47fff6b0d69050458adcb669fa118743102d3ef6e6d5ec7b99224514ee157268f04fee6b13c5004153c32f67d5ab

  • SSDEEP

    1536:OmfWSqHdykrVMKuJUYFG8/I7wS8qejbJgySL8Gs1vrmTG9x:OmeSqHdykGKuJUYFu7wS8qEbJZ1vEWx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Os-Shark

C2

osostata.com:5555

Mutex

AsyncMutex_juyku78k

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4228-15-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections