General

  • Target

    5032-135-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    b5967770ebfffa9d20c6314c26d5a6c0

  • SHA1

    27dc1b4a5c5640e72df70e78c9e59f046b59a9b7

  • SHA256

    1f043e947dcf804471fc2692a5f51d05a9babe0541032e5598a92a9621b12f06

  • SHA512

    d02f6d07983b476a216901655385d7affd399e209ce73ff51fa8878b988eb968388f3ec03307c234bbe4648d9e05154090883c1b073d96738824e3e6cb72a1ed

  • SSDEEP

    768:5OEuILWCKi+DiE+Q/wGii8Yb3geNbZ/P8wBvEgK/JTZVc6KN:5OtmEDlzbQClP88nkJTZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Game

C2

84.54.50.51:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5032-135-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections