General

  • Target

    2992-30-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    240805-jr4d5azhlm

  • MD5

    f74e11e9befa73216e67bc5ac3b56d0d

  • SHA1

    46fe5668905efc9d188e7cb37240673fa6c792f1

  • SHA256

    d29f50ede1dd3628d0f5e1393ca6f8dce7bc16d7b1fa519bfae52e5664b10245

  • SHA512

    bfa524d700b08fe0e01f41d9dfbc49a85a0189b11bfb0a65dba85205cf7826a9e603888a393dbd6b26250260e6fd2f2bc54d8a102b7fe00c4e2bcf88b3957ef7

  • SSDEEP

    768:suu91TwQsOnFWUF01/mo2qDpghWjK4PIKUCAT0bbnpAxpOf6PBNh8BDZ8x:suu91TwSo21F9KUCAYbbnKmi5Kd8x

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

5.252.165.55:1986

Mutex

AsyncMutex_5SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Notes.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2992-30-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      f74e11e9befa73216e67bc5ac3b56d0d

    • SHA1

      46fe5668905efc9d188e7cb37240673fa6c792f1

    • SHA256

      d29f50ede1dd3628d0f5e1393ca6f8dce7bc16d7b1fa519bfae52e5664b10245

    • SHA512

      bfa524d700b08fe0e01f41d9dfbc49a85a0189b11bfb0a65dba85205cf7826a9e603888a393dbd6b26250260e6fd2f2bc54d8a102b7fe00c4e2bcf88b3957ef7

    • SSDEEP

      768:suu91TwQsOnFWUF01/mo2qDpghWjK4PIKUCAT0bbnpAxpOf6PBNh8BDZ8x:suu91TwSo21F9KUCAYbbnKmi5Kd8x

    Score
    1/10

MITRE ATT&CK Matrix

Tasks