General

  • Target

    IDAT_final_payload_bkvkt.bin

  • Size

    66KB

  • MD5

    51f610e5dd132c3a4c75e0a3b03ad1e8

  • SHA1

    487cb274115d58df427b787ccd2bcda81da571e5

  • SHA256

    858bc1d6ff8edcedb9ecd23e6390134d40073d4c22e15f8639b394148e07ebd5

  • SHA512

    0094a2721ed342d602561a8188d130538f9c27f91c5cd042e7f02613c28abdc94169b296cb42d9031799730c239f94543c2104791a813fa935268756357a5533

  • SSDEEP

    1536:imImx6tX2kNff4sKu+UYFsy3XR+zb7wohYH4VcfrPlTGFxkPP0:im9x6tmkN7Ku+UYFFReb7l6duxd

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

envio202409sep.duckdns.org:3030

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • IDAT_final_payload_bkvkt.bin
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections