General

  • Target

    AsyncClient.exe

  • Size

    47KB

  • MD5

    d3e1fc181372a9f5072baabb104f9106

  • SHA1

    3533a530fe34e83ac85256ccef164d8c7e2cce77

  • SHA256

    83ff1ee5a133a1fd6097a3ffcdf3ca04d63bf9ecbdc455644452b71f86fdec05

  • SHA512

    69d81a5f0a1572e5b128e0a7d9d7b50ddb14eed5fec5bb68b0a63b108ca80f636b5cf14957fee9e1ecc23dc41c6bc0beeb4e959a3d617b0bd10ab719e7fd3f56

  • SSDEEP

    768:kuir1TUEFSuWUoV3kmo2qzchcjpOjhQsURPIXrMDATV0bzi9EcXwa6lEPCbC4Sn+:kuir1TUKP2XhcQ7VXrtubzJcgaecCSB8

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:9999

Mutex

Lp5K9nZH1iDe

Attributes
  • delay

    3

  • install

    true

  • install_file

    xtestx.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • AsyncClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections