General

  • Target

    dwm.exe

  • Size

    48KB

  • MD5

    7ec9e8a3aa64dd9bd0547ae55d29a79a

  • SHA1

    818e73dd29fabe93d425f3b11ad061b87dab1787

  • SHA256

    cc89512cf8710a8005a5c64d9e3bc0c45c3f025eb010892ef08d5da6786b5961

  • SHA512

    71cc03d084711ac9b9a7d9097dd133405ed09a8c33223c354a2f499c5d38b5d0ff28e510b3e992f09978d9efc48da63a3640456d60c0a8163cc2310089250514

  • SSDEEP

    768:WUkPIL2C6y+DiNbik7U8Yb2g1aVLX6BKvEgK/JbpVc6KN:WU22Uzbp+X1nkJbpVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

94.124.192.220:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    Desktop Window Manager.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dwm.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections