General

  • Target

    430237c86601ab4770006d76389080bd.bin

  • Size

    28KB

  • MD5

    b8ec634d5fc9ee0676b60a1ff5ff5c80

  • SHA1

    77f96e20fd6cc95da2944a25adb0e4fc87ddcc95

  • SHA256

    49a39cd379b3295f0b31dc202000e9d5a36951fda6301d2df5413e1f7260ed2e

  • SHA512

    8256d6f5ddc25b005dd38f0dfe482cc84f373c0fe0fc262efd269b45955ff86346c880b782bc1cdcf39d3b23b7516f0040c5cbea55f1ac1a18a61aeb40eead4f

  • SSDEEP

    384:Jr00pf9mlTnpfBs/RF4EtuH+pEWI85j5zLJxYLhUilRA/2/KNgZ:JrjfolTRBspqEpIw50hUilq+yo

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

8

C2

xfreddy2751.duckdns.org:6606

xfreddy2751.duckdns.org:7707

xfreddy2751.duckdns.org:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    License.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 430237c86601ab4770006d76389080bd.bin
    .zip

    Password: infected

  • 64016346314035c592b6f5d73e5c90881e02dd57fb8ac64008eea5c227c058d2.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections