General

  • Target

    4772-87-0x0000000007F60000-0x0000000007F90000-memory.dmp

  • Size

    192KB

  • MD5

    a315cb4fa58909e05b3476a1dc99799d

  • SHA1

    03115839d9bbce6c5be1da56e58e281fbdc86ec0

  • SHA256

    1fffe2d877613e62672914112206990b1ec33f5afeb86cc3019802f179fbd40a

  • SHA512

    8958fa32cb71010bee619347828b43341067d06fb6c8f493b85086169616941fae611c08343ae47689c1b6fda3499dba04317277a06a2888695f5630de798970

  • SSDEEP

    3072:MnSTTT2dVpn2wJkyT2aMZ+oJLrCi6qIPu/i9bVK2cHwATY+WpW:lT2bd2wbT2RIqPf6XPSi9b4f

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6342313307:AAFKd4P2Qn-FrHlxYQr9imHCnOVc5Cl4eMI/sendMessage?chat_id=1059970907

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4772-87-0x0000000007F60000-0x0000000007F90000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections