General

  • Target

    869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.zip

  • Size

    23KB

  • MD5

    3ec63f401e739eb0411e7d35d987c98d

  • SHA1

    0703806e85c5fad6c4978097e0e222567c21fe50

  • SHA256

    78f43e7a76d172b4ffdb091f1f14e9d67600660624ec05752ee40074643dfe92

  • SHA512

    0db11113bf18f8fa4986a6547524e02d917250f51562af51bba0684a86e47c6f680392f9d66a3bb72053ede3d0756cad00b739e441cd7e818d92147851989e35

  • SSDEEP

    384:O34EP803rJhHHw+Ngo0maLGbXJc8GH160CvdP7LQAux1Hk2thnP9YeehO2YTl6:fSrnj8mCH0jLWx1Hk+P9ShpYTl6

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/SmAM5GKw

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.zip
    .zip

    Password: infected

  • 869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections