General

  • Target

    1724651706a74abcdfafd3b4ccafd9d5fb86ab12740c2c566c975c7fc300271cac9d6890ea806.dat-decoded

  • Size

    63KB

  • MD5

    ddcd5c52e63a4df0de291d5c6c5c0ff9

  • SHA1

    adb18cfc0151199bf5e159cc6d9b44089e911b08

  • SHA256

    6bb2386101837fd4e8a32018f2d8ec5bbd646bef9a5513783f782fe2ae1ff3e0

  • SHA512

    f1461206c619945493558e8e036b6f8a94b742878e3ca1184a6fa1cbbf2158b7920526bc27e77f2f4f552e7c994ef6f7c59827d5cf1468464d6650dcdb3493b0

  • SSDEEP

    1536:nqVdKDvN8koKoKuHUYFcO8I5bnAPzqvpPuK6crXlTGpx:nqXKbN8kmKuHUYFuI5bn/huUlyx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

trabajo25.duckdns.org:3000

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    server.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1724651706a74abcdfafd3b4ccafd9d5fb86ab12740c2c566c975c7fc300271cac9d6890ea806.dat-decoded
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections