General

  • Target

    New folder.zip

  • Size

    1.2MB

  • MD5

    622d5994b151cf2d039d32b5cdd83227

  • SHA1

    312e0a45ffdbcf32e26f2699d3d3f7fdefbc020f

  • SHA256

    8d7e0046922716f97deef518f2d9f05e7a7dc8c3b6065b8d01ed1844c05d1999

  • SHA512

    5659576c8303688e320fbe4e3e4c5813a3cae7421fa6ffadc02743c22f24f0ad9c5aae65366fa5e980fa8cc099038054a4d391381deac4b41123cd9db36fe43a

  • SSDEEP

    24576:KR5iks6CqE+i952S3R9JIIy6JknCd6n7MZlTfc+kVKbxTKQDFC:7D6JE552S3lJk86n7ATfc9VKbvC

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:8808

Mutex

QdNftpHJFSw4

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 7 IoCs

    Checks for missing Authenticode signature.

Files

  • New folder.zip
    .zip
  • New folder/AsyncClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • New folder/New folder.exe
    .exe windows:5 windows x64 arch:x64

    b1c5b1beabd90d9fdabd1df0779ea832


    Headers

    Imports

    Sections

  • New folder/Script.vbs
  • New folder/apocalypse.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • New folder/borat.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • New folder/purple.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • New folder/test.bat
  • New folder/test.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections