General

  • Target

    45abacc322b0bd8f03e1b9db949fbc6be8b45eea711a6dfe0084b2b9c30d606c

  • Size

    63KB

  • MD5

    7da05eaab77650b28bf26977af7b155a

  • SHA1

    980d2c13030918db25d4b716f7a95450e4e2647c

  • SHA256

    45abacc322b0bd8f03e1b9db949fbc6be8b45eea711a6dfe0084b2b9c30d606c

  • SHA512

    0768c0adc66381832b6a3bfa87b4c627553a2e6e915c401ea8ba520a98a8e964df093eaa1a5a0d943df43858ea252b49cb1efc0d2710464b47748d95745a5ad1

  • SSDEEP

    1536:BBeQr35APUolZON/yeeiMl8GbbXwGFLSwJW3GxZVclN:BBzr35APUoly/reFmGbbX5hSgvzY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

127.0.0.1:6969

127.0.0.1:29359

22.ip.gl.ply.gg:8848

22.ip.gl.ply.gg:6969

22.ip.gl.ply.gg:29359

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    fkjnmdlscgjn.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 45abacc322b0bd8f03e1b9db949fbc6be8b45eea711a6dfe0084b2b9c30d606c
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections