General

  • Target

    2696-13-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    241104-jr1y1axdrg

  • MD5

    f6aa097d2ce1c4db2228a798249d02b8

  • SHA1

    6d1e12943534e65f2bc8667fd4163fef0542f7bc

  • SHA256

    39905552ab2a4a71ac6cbbf73b45592c0a6ce765384cc4aef8fcad016bbeb057

  • SHA512

    835f7e0edc59451837959d3955a551838b6da76fabba2b2ad039663a60e2e907346226b771e95f983d12840ee0edca38400eed14ce89f15d1afceba41b8265be

  • SSDEEP

    768:NuPfZTg4pYiWUU9jjmo2qrbpt0vThdjCvx8PIW5jb8gX3iiMF1isUzZKMqgBDZOx:NuPfZTgKa2U216BW5bTXSiMFcntVdOx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:1960

cuit.ydns.eu:1960

Mutex

Ym9duGjX2Yzz

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2696-13-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      f6aa097d2ce1c4db2228a798249d02b8

    • SHA1

      6d1e12943534e65f2bc8667fd4163fef0542f7bc

    • SHA256

      39905552ab2a4a71ac6cbbf73b45592c0a6ce765384cc4aef8fcad016bbeb057

    • SHA512

      835f7e0edc59451837959d3955a551838b6da76fabba2b2ad039663a60e2e907346226b771e95f983d12840ee0edca38400eed14ce89f15d1afceba41b8265be

    • SSDEEP

      768:NuPfZTg4pYiWUU9jjmo2qrbpt0vThdjCvx8PIW5jb8gX3iiMF1isUzZKMqgBDZOx:NuPfZTgKa2U216BW5bTXSiMFcntVdOx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks