General

  • Target

    Client.exe

  • Size

    48KB

  • MD5

    9028b853115f1fbc562435c3191b3546

  • SHA1

    3b06a8e9bafe7a1d75243884fc11862c059a29dd

  • SHA256

    b40bb21bbe95e8431da174700874d89150002a974e7046890146d06cec9044ad

  • SHA512

    d4e7fd7b13075af3a2f6d83ebb3106c48dad939eee1281a3acdd653d0d093757fcfce4072a1de8ac8a7eaab4ed7ecf560d56e03c8864f14d626da54e7146eb80

  • SSDEEP

    768:lV9TQo2oIL4+M0+LiktelDSN+iV08Ybyge7LrMvEgK/JzWfVc6KN:lVpQoVsktKDs4zb1wUnkJzWfVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

127.0.0.1:54025

147.185.221.23:8848

147.185.221.23:54025

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    opus hook injector.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections