General

  • Target

    Thrax_AIO (1).exe

  • Size

    48KB

  • MD5

    b7ef131d413ce5642a62ae88eca497f4

  • SHA1

    31c8c27e1cca0b6ca823e691c666cebff3a0633a

  • SHA256

    b1c8a0ddef6867aa10929e798a13cb249a17e5c4f7c908fc1fcf7c91cac8a584

  • SHA512

    c71b374ec5d0e1c065fdda007a4a0ddec6642d1f519ad4d404668ec3c206d10d2b7eb320c132226f915919a96ee795ddb5d5a38903a5fe3ce00cdcd3c2485aac

  • SSDEEP

    768:U/GP8ILKimv+LiE81jhCpFYi4hYb6ge1RQvEgK/JPYVc6KN:U/LPdeGSbtsQnkJPYVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • c2_url_file

    https://Pastebin.com/raw/fevFJe98

  • delay

    1

  • install

    true

  • install_file

    Thrax AIO.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Thrax_AIO (1).exe
    .exe windows:4 windows x86 arch:x86

    Password: titty

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections