General

  • Target

    AsynIr

  • Size

    64KB

  • MD5

    74195bd029186574f2f5adb32a15e7c1

  • SHA1

    8472167bc348f85491f9a00a8b830a6b63f7276c

  • SHA256

    34f6634f4d992f3159096ba6bd46592ad15e43fafc40f589c0c77c3581a6e907

  • SHA512

    cf08436a678135a12c5b38ea3a24eceb6c6bab2db158f755eee3f929435133f842ef7b56da4e6f9d79f9e0cb50c325d384f4a7ffb9a4a994f29fe5d9f3dd881d

  • SSDEEP

    1536:32qH6R6tw6enoAUCYPFvZVf3RY7ExoQNgRK5TCdTyZFGFkqkbni8Q5+pi7cpzvx:32qH6R6tw6eoHCYPFvZVf3RY7ExoQNg0

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

()()()BB()()()

C2

ch3.theworkpc.com:1000

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • AsynIr
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections