General

  • Target

    Spofer.exe

  • Size

    47KB

  • MD5

    eaf40238b22c8d60c1ccc1f3d307a118

  • SHA1

    8198f96a2cd391948d1857a65d5abe8916add847

  • SHA256

    48a9596bd4aefc428dff563a9942639d8bfe74372a50218b79c387d36e41a3df

  • SHA512

    d07116b990c3e99acb570ab088b8d15ef613587f9c8acda332f2cd590c19082cc306f8936b08c8460171de31fcb58d57648c161824f6151f3ecf4f3a6275b81a

  • SSDEEP

    768:xuu91TwQsOnFWUFN1/mo2qDnNyiwoujmXnPIC2e0bYRM4hg7RqjtKBDZMx:xuu91TwSb2WIiumXAC2RbYRZOPdMx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

Ratrat2-53904.portmap.host:53904

Mutex

AEUSlyyU5H0R

Attributes
  • delay

    3

  • install

    true

  • install_file

    token.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Spofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections