General

  • Target

    130fdbe7e4608b84b16122bca61aee0943d29b02222bd11bbb6f99708cf53fa0

  • Size

    28KB

  • MD5

    f028492dbb32219f9a52e02fba9b8308

  • SHA1

    ad775600583d4059a24b48aa2782ab63a4402edd

  • SHA256

    130fdbe7e4608b84b16122bca61aee0943d29b02222bd11bbb6f99708cf53fa0

  • SHA512

    dd5b8f30e127967e92aa456ef07c8dc5e5ea6d63231cab4afe3397abde2b8e2cc50982485a03daa36fe8fc9ecce54c62cf355066c5f49744996ff99c58dc6c50

  • SSDEEP

    768:/mSnQ1uJWqhroQxyBWbmGr+5NKkbvP91Ina2kHtFY0r:eSnQcgq1RxyB8mGrIKkRWH8tFX

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Exodus_Market

C2

leetboy.dynuddns.net:1339

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchos.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 130fdbe7e4608b84b16122bca61aee0943d29b02222bd11bbb6f99708cf53fa0
    .zip

    Password: infected

  • 447eae52ab1979405497866c72df7ec0703085ad6946ab0127f612b1518f8759.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections