General

  • Target

    915bf5a44dfb26884cc24273094cc0043ba7e76eb7557b5f5f962bb75ec3377f.exe

  • Size

    47KB

  • MD5

    3d5b5f606bb9ba67e94039a7a6986e73

  • SHA1

    2df9bc47d9719d24b3e3a2d06738cc95e5e33aa0

  • SHA256

    915bf5a44dfb26884cc24273094cc0043ba7e76eb7557b5f5f962bb75ec3377f

  • SHA512

    a7db26d4693be9aacb423f1ced1660021178a6827539234dd42f26ad2df15dad47fda6500471a38762c214fa8fa7c9c860b03da75cd9a3cdd52630251dae4408

  • SSDEEP

    768:Eq+s3pUtDILNCCa+DiPyeLddR56LV0TqQij1J8Yb4gexwlViw/vEgK/JDZVc6KN:Eq+AGtQOaovyLxPDzbv79/nkJDZVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

ESPECIALES777

C2

procesoexitos1.duckdns.org:7090

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Detects executables attemping to enumerate video devices using WMI 1 IoCs
  • Detects executables containing the string DcRatBy 1 IoCs
  • Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 915bf5a44dfb26884cc24273094cc0043ba7e76eb7557b5f5f962bb75ec3377f.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections