General

  • Target

    8a3ec8a2abca5b3d6cbe4f5c58b8621fff02c108bc7bb443e5b2c22c00d71efe

  • Size

    63KB

  • MD5

    a4504cbbd83567d4daf0b2582ddcc548

  • SHA1

    05e6a7ea0dc14c0f228c0c19d940c93c4890b836

  • SHA256

    8a3ec8a2abca5b3d6cbe4f5c58b8621fff02c108bc7bb443e5b2c22c00d71efe

  • SHA512

    938d57ea6040836f55357fd5f8c8864d01fe1c357e599c65ce1550f04534d5b107a6200866cde343272aca2cb089b8d75c41b4358dae4fc56e4860db8c95f9a8

  • SSDEEP

    1536:yhjMxLDRwQuNMXbmaeCs2lLMTCNiINGbb8w5et68pGeUVclN:yhjMxLDRwQuNMXbreKlLMX0Gbb8O068N

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

lemback.dns.navy:7979

Mutex

mutesdFGSkjfbhvfhdkf

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8a3ec8a2abca5b3d6cbe4f5c58b8621fff02c108bc7bb443e5b2c22c00d71efe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections