General

  • Target

    2712-10-0x00000000000D0000-0x00000000000E2000-memory.dmp

  • Size

    72KB

  • Sample

    241112-xbchcsyekn

  • MD5

    dc3a0361cbca1ed88f53c5081cbbb6c0

  • SHA1

    3a0666e8f8a372c96fb26d00dd3bb0077707f56f

  • SHA256

    d8e8e5e04d1cd17312a8dbcfec13d7d995377e7425fa6cbaa36d6bddb48ed23e

  • SHA512

    c4211c83e1a9b79506124967bef4683a478ac53a2eafc0e1b96fd2d74370d37240c6aa49ed31644f9544fde45a49bb8ab81189467d6c248bff09edcfcdc77ae7

  • SSDEEP

    768:K/epKIL4I/3+5ij29oIi+KYbvge1S6vEgK/JDZVc6KN:K/eBi915bYv6nkJDZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

FENDI

C2

octubre212024.giize.com:2727

fuertefuerte.accesscam.org:2727

octubre242024.casacam.net:2727

castanojulian1111.chickenkiller.com:2727

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2712-10-0x00000000000D0000-0x00000000000E2000-memory.dmp

    • Size

      72KB

    • MD5

      dc3a0361cbca1ed88f53c5081cbbb6c0

    • SHA1

      3a0666e8f8a372c96fb26d00dd3bb0077707f56f

    • SHA256

      d8e8e5e04d1cd17312a8dbcfec13d7d995377e7425fa6cbaa36d6bddb48ed23e

    • SHA512

      c4211c83e1a9b79506124967bef4683a478ac53a2eafc0e1b96fd2d74370d37240c6aa49ed31644f9544fde45a49bb8ab81189467d6c248bff09edcfcdc77ae7

    • SSDEEP

      768:K/epKIL4I/3+5ij29oIi+KYbvge1S6vEgK/JDZVc6KN:K/eBi915bYv6nkJDZVclN

    Score
    1/10

MITRE ATT&CK Matrix

Tasks