General

  • Target

    5032-135-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    240311-23a6tsbb34

  • MD5

    b5967770ebfffa9d20c6314c26d5a6c0

  • SHA1

    27dc1b4a5c5640e72df70e78c9e59f046b59a9b7

  • SHA256

    1f043e947dcf804471fc2692a5f51d05a9babe0541032e5598a92a9621b12f06

  • SHA512

    d02f6d07983b476a216901655385d7affd399e209ce73ff51fa8878b988eb968388f3ec03307c234bbe4648d9e05154090883c1b073d96738824e3e6cb72a1ed

  • SSDEEP

    768:5OEuILWCKi+DiE+Q/wGii8Yb3geNbZ/P8wBvEgK/JTZVc6KN:5OtmEDlzbQClP88nkJTZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Game

C2

84.54.50.51:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      5032-135-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      b5967770ebfffa9d20c6314c26d5a6c0

    • SHA1

      27dc1b4a5c5640e72df70e78c9e59f046b59a9b7

    • SHA256

      1f043e947dcf804471fc2692a5f51d05a9babe0541032e5598a92a9621b12f06

    • SHA512

      d02f6d07983b476a216901655385d7affd399e209ce73ff51fa8878b988eb968388f3ec03307c234bbe4648d9e05154090883c1b073d96738824e3e6cb72a1ed

    • SSDEEP

      768:5OEuILWCKi+DiE+Q/wGii8Yb3geNbZ/P8wBvEgK/JTZVc6KN:5OtmEDlzbQClP88nkJTZVclN

    Score
    1/10

MITRE ATT&CK Matrix

Tasks