General

  • Target

    1372-14-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    231017-kan4jscb74

  • MD5

    80c29251e31f99ce336a68ac49f05ff1

  • SHA1

    699ad6d1d6f4baef2767c374dba188a88674fa02

  • SHA256

    f206e5711e6a37d3390bda954a89c05a7c65e5dafd3f21e5b18585875facabd3

  • SHA512

    7a7e84708cf1cb5f92ab3188b4aa0bb3390d2dee3c0eb72e52cc7ad9fe395ea007066d7e5bbdadb948f01084531ea5332acb7ad1e4f34ddb45d5f0af3807c00a

  • SSDEEP

    1536:qmfuSa/dSkDVMKuJUYFIBvLHBbYa6GeNRhwKlrPlTGJx:qmGSa/dSkOKuJUYFKvLhbYa/JKldKx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

2

C2

shady-mo.duckdns.org:9090

Mutex

Async_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1372-14-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      80c29251e31f99ce336a68ac49f05ff1

    • SHA1

      699ad6d1d6f4baef2767c374dba188a88674fa02

    • SHA256

      f206e5711e6a37d3390bda954a89c05a7c65e5dafd3f21e5b18585875facabd3

    • SHA512

      7a7e84708cf1cb5f92ab3188b4aa0bb3390d2dee3c0eb72e52cc7ad9fe395ea007066d7e5bbdadb948f01084531ea5332acb7ad1e4f34ddb45d5f0af3807c00a

    • SSDEEP

      1536:qmfuSa/dSkDVMKuJUYFIBvLHBbYa6GeNRhwKlrPlTGJx:qmGSa/dSkOKuJUYFKvLhbYa/JKldKx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks