General

  • Target

    testing.exe

  • Size

    63KB

  • MD5

    0ebc8082d7279e75c1ebf964174ff3ae

  • SHA1

    7b222419a9e4deacdcd6920a7aedc9c23f30da97

  • SHA256

    1908b909dd7b46e0e66f98ea14b566b24c1188d4f4df2703e80f2f74f7d9fa76

  • SHA512

    c52174e6ade31f4463c069a664cb8ecd32f083b2ebd1de685fb7e2a8cccb75b3979b0d3ced5bfad741a14a3ed2626b369cdad76875a81f94a43464d331d1d983

  • SSDEEP

    768:ovsM2sk/978SQC8A+Xju0nmlhGq6lY8uae/1+T4dSBGHmDbDxph0oXybuhiszSuC:L1/MQ/G9lFu/CYUbLh9BiucdpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

19.ip.gl.ply.gg:7000

19.ip.gl.ply.gg:51939

size-violations.gl.at.ply.gg:7000

size-violations.gl.at.ply.gg:51939

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • testing.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections