General

  • Target

    2a0179de868a92468d14c225a082437e9c16267ba0718e750b7900435b7ea5ed

  • Size

    65KB

  • MD5

    c59017ea85bba7dd74812bda3217babf

  • SHA1

    206583b69ee201c7c737a1c8da7de8ab2c9f027f

  • SHA256

    2a0179de868a92468d14c225a082437e9c16267ba0718e750b7900435b7ea5ed

  • SHA512

    1b8fb72468bc3513155aec27961458031aa21c9ae7b9105f32fa91c3edd34f595376068ccf6f8e204a14755dda2a798945259d341008f5d722d029046b966f19

  • SSDEEP

    768:NwGjMgZ6AbTDE9YovM5SDJMQ8IPiEoaHCpd1sBtgHuPCSCvMmqb2nDpjrF1o9VY0:1jMgZvb6Dhdimi/eAafhbbSfl8/z

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

2.0.0

Botnet

Default

C2

webwhatsapp.cc:65503

Mutex

no2.agentwindows.college

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Detects executables attemping to enumerate video devices using WMI 1 IoCs
  • Detects executables containing the string DcRatBy 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a0179de868a92468d14c225a082437e9c16267ba0718e750b7900435b7ea5ed
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections