General

  • Target

    5d787e95e846b54244fd851845f8ec879b157692fd4df1e52d702f8d7e08d659

  • Size

    45KB

  • MD5

    d7614cab8df9fb705119d1ffe0dbe9dd

  • SHA1

    5856b8482ee1ee2b321d926caa13e60a5ac68fbe

  • SHA256

    5d787e95e846b54244fd851845f8ec879b157692fd4df1e52d702f8d7e08d659

  • SHA512

    ac9a37634e2a46101fde818f51d5deefc12baef6daddf46aacd07ea0a4c9f0762e6a7c3453f58b45a7b2f0f484f13b3f6d8ce44fe87a7de490f016eac2be2881

  • SSDEEP

    768:vuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3iunWTggEGSfBDZSx:vuwCfTgp/2OKYDy3bCXSfYpdSx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

192.168.1.35:6606

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Detects file containing reversed ASEP Autorun registry keys 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5d787e95e846b54244fd851845f8ec879b157692fd4df1e52d702f8d7e08d659
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections