General

  • Target

    1136-68-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    b6cec93593584d50c02b61cf9bd98e63

  • SHA1

    9ae1eff7a79c4d68aaa2cb860e7d9efbeb6d2144

  • SHA256

    a4b1495e58ac2dce3d4de64de822935f71b9ebe927af0dc6c368efd24c2c9800

  • SHA512

    e476b0040f9555eb28c9cf92abbf32db84229a27a2faef6454947b3e76aade3e33c915219f0785f4fdc3a7d77e4f810469af7826bf8357426f53eed3fc768680

  • SSDEEP

    1536:w2cn8F7CSQk+/QNKufUYFbGXw5bfAPiuk73zG+rPlTGxx:w2o8F7CSQkPKufUYFbGXw5bfPzG+dKx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

19

C2

xfreddy2751.duckdns.org:6606

xfreddy2751.duckdns.org:7707

xfreddy2751.duckdns.org:8808

darkstorm275991.ddns.net:6606

darkstorm275991.ddns.net:7707

darkstorm275991.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    License.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1136-68-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections