General

  • Target

    2924-26-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    05fdf22ced0890c30689555c04d6d3fb

  • SHA1

    f17e7511ef5d3c6e9efbc3be51c32da857283485

  • SHA256

    cd77d4e10ef026c80029665dc0620cfeaa7364da0cd67d526fc95e2a5e6011b8

  • SHA512

    8c6b75b2e193ebdb2cc70cd7416c4ae882ac04f707bd0db19966b7a45ccda80197646058e5ba598f7ca74761558f3baa5435ab37911b74afc6c7b674e06f3b91

  • SSDEEP

    1536:Zu4D9Tswb29oO2h2tdbbLaIw6F6wsxdSEd:Zu4ZTswb29dO2zbbLaIl6d

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

AMU

C2

jnmanymen.ydns.eu:1470

Mutex

Y9Lj8dOJExpn

Attributes
  • delay

    10

  • install

    true

  • install_file

    windows.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2924-26-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections