General

  • Target

    FlySide.exe

  • Size

    234KB

  • MD5

    0f582a0b2557f50a4745751a4c128c34

  • SHA1

    894660b4a64e8309393f08f686cade8721dc5f73

  • SHA256

    48429db29ff42c7c50264ca1645560f5ca4e2a3e0f934dd59a06572c7770e7e7

  • SHA512

    b1c860bbae77ac8642bf1fb7963606b64d74b7ceb7e28d262b3cb2ae8a2e843aa22bfc18cc4882df1e83e58009205805452a412eddcd87615a6b3fb5802fab34

  • SSDEEP

    1536:WpN/jdSJYUbdh9TV4uHaeQKKKKKKKKb4NMjB8X9C+VdpqKmY7:WTjYYUbdfaepMjOXc+VGz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    Winrar.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • FlySide.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections