General

  • Target

    a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad

  • Size

    47KB

  • MD5

    0c35e8c36f627e8801c85a26d7e63b2b

  • SHA1

    9d0d43a793ba17b89d9af95d48c30f5c6757288e

  • SHA256

    a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad

  • SHA512

    fc7e01c70faa4ec8425456bd2357f288bcd39d65e090423e7aea407de008c56bcb7812cefc5f476680fb57616641bb02ac21b1caf72b264d73b04e21c5ed77ac

  • SSDEEP

    768:MukjVT0kLd3WULVPdVmo2qDNg8YwBTNNMPI4TGKXCp5/0b6rwxE1+LimhQ5JBDZ2:MukjVT0M912zwBXx4iEZb6ru7icsd0x

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

4.tcp.eu.ngrok.io:4040

4.tcp.eu.ngrok.io:120

4.tcp.eu.ngrok.io:14232

Mutex

AWCmV7whrG8q

Attributes
  • delay

    3

  • install

    true

  • install_file

    sellam.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections