General

  • Target

    368-17-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    0e74ce6daf9080e14d7003501920436e

  • SHA1

    53b4bca839382b19864e5885c25a57c8633320be

  • SHA256

    4f6d77a54e0ea1d8a77bac30619608ba588dc6c7227d35f5a33ff64ee3e74ce6

  • SHA512

    b8a794f513de8616df477ec2f3534ef7b71c852e7dbfe9fe7a482a037a55060470893ca271945d9ca26f2522d121b1f43db2aa52a0f0826ea9addf18a2db77ca

  • SSDEEP

    1536:P2wmkPN1ak1gcKu5UYFpY/jCBebb0UZkg7pVop1rPlTGxx:P21kPN1ak1Ku5UYFp6Mebb0Q9gdCx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

forlatinamerica.bumbleshrimp.com:2404

Mutex

AsyncMutex_Tre

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 368-17-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections