General

  • Target

    2232-48-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    79e5c10d13a364147714c05d4ec89a39

  • SHA1

    1396ca805f87aefbef533024d6ce878fdc17786b

  • SHA256

    891bbb2059de0675521b8c0897e9a15a4dbfe0b05870752c0d661bcbbdc5a7d2

  • SHA512

    200194fe032ca2424a20df638ec5805578cd00a7ee3cd495635b08592eb4324f9c51dd9b61a178c751bbacc51d248bae7c1b6877d815d389523e6bad2eeb672e

  • SSDEEP

    1536:4O65JLg8kYWdKuvUYFYAuY5b2AP8Qks33rXlTGZx:4OUJLg8kLKuvUYF15b21QksHlix

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

AWS | RxR

Botnet

Default

C2

lastofdr51.mywire.org:6606

lastofdr51.mywire.org:7707

lastofdr51.mywire.org:8808

Nightmare15.strangled.net:6606

Nightmare15.strangled.net:7707

Nightmare15.strangled.net:8808

darkenssnight.ydns.eu:6606

darkenssnight.ydns.eu:7707

darkenssnight.ydns.eu:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    SystemUpdate.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2232-48-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections