General

  • Target

    81f6b674f3bc9a33424293cba5b2f63a9717afcdc1e6619a2a335d0e41546a03.exe

  • Size

    63KB

  • MD5

    a517b351592a68de19d643d3702433e6

  • SHA1

    e49d9ec67336d00a7c6772aebbbb28e8af82cfd4

  • SHA256

    81f6b674f3bc9a33424293cba5b2f63a9717afcdc1e6619a2a335d0e41546a03

  • SHA512

    e08107dbe762c2f355b2e2cdd1489ddddccb37aa4b5a26a9f1be8c40bc50ff89ea7e0df6e4707dd0fdbab34c1b34521f69eb6dffccacd192494571d7b6b289b0

  • SSDEEP

    1536:VBtb3plA0aTdeKvCeeiMl8GbbXw7x7OFk38DDGBZVclN:VBtb3plA0aTRvbeFmGbbXox7Sk6mzY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

patria.duckdns.org:1993

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    FULL.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Detects executables attemping to enumerate video devices using WMI 1 IoCs
  • Detects executables containing the string DcRatBy 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 81f6b674f3bc9a33424293cba5b2f63a9717afcdc1e6619a2a335d0e41546a03.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections