General

  • Target

    72d5dd1779605dcfd7c9dfaa885ec38ea884786293c5088b282bd539433ed855

  • Size

    22KB

  • MD5

    01f39a4910c336f9a358b344a087d2c9

  • SHA1

    2a513b30196991ad8ab3f343981439d2613cfb21

  • SHA256

    72d5dd1779605dcfd7c9dfaa885ec38ea884786293c5088b282bd539433ed855

  • SHA512

    1555a48685462d61fd8ea9aeef7b926ea4a8297330130e3d09678eeb5f7ed6e5beeabf5b78c626a84866209ab6eac2984319141585898a060eb2581cafc2d8d3

  • SSDEEP

    384:sLnQYSdnYfgUTsQiE82BivtVNJLwEuWopfuY2IYRVDpLPjxyv/DdWULdynX:sXi+gU49E8aivtJl5oJuYaRPZyzjdyX

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

C2

45.88.186.16:8808

Mutex

KO9wieKomYkG

Attributes
  • delay

    3

  • install

    true

  • install_file

    MicrosoftServer.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 72d5dd1779605dcfd7c9dfaa885ec38ea884786293c5088b282bd539433ed855
    .zip

    Password: infected

  • 0eb46efbb0344f6599caaafbde6899f71aa5c8bb0a0586f58541d8de60f663dc.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections