General

  • Target

    139a7b43f67db8dc140f2763aff57867_JaffaCakes118

  • Size

    45KB

  • MD5

    139a7b43f67db8dc140f2763aff57867

  • SHA1

    4a6a7c7a4ee20f57f006793f388599b1de26ec39

  • SHA256

    677e5377c495b33a022ee13fcbd8d70a349b104190eb4892de4355d978224b15

  • SHA512

    8c522a628f0d63309199334c7f4696cd5d7fbec1534f1fa95414a54dd9fcffdf828f547af35795541a0f620710b46280f9b0fad45fc589036e68b0f9e061ef7c

  • SSDEEP

    768:zu1jUVTBY+hnWUbSylmo2qj8FpxY8GYPPIDyjbrgX3iHKdZYrC10V8zJ+YBDZzx:zuVUVTBx527oxDebUXSH82G1dgedzx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

clients

C2

blackid-35823.portmap.host:8808

Mutex

uefhksughfjhgfkehvfusuyfkwjhriehgejhgwkjgfvhgwfgkjwg

Attributes
  • delay

    3

  • install

    false

  • install_file

    winloginstring.exe

  • install_folder

    %AppData%

aes.plain
1
tvgUKsa1a1VmXPwFewFR8WelXkm9gq2n

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 139a7b43f67db8dc140f2763aff57867_JaffaCakes118
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.