General

  • Target

    2432d3c26f9cc527403a4fc1f6a7d8a9e8646cc220660fa408cf8613de7b7001

  • Size

    48KB

  • MD5

    cf34ddd4811d4dc055b8d5cd133af1fc

  • SHA1

    cdb3c5623ed5c9732b1d49a43e61873d86ea87b3

  • SHA256

    2432d3c26f9cc527403a4fc1f6a7d8a9e8646cc220660fa408cf8613de7b7001

  • SHA512

    2537eff86dcf84862257e90631192c3b2af4077e54343143a1ada14c40c37a31492877f33ffc12b0505eede1972f4fb986d4e672b53397a96e447b281f17db8b

  • SSDEEP

    768:SuwpFTAY3IQWUe9jqmo2qLEhVDBNwGqrFPIuY29RzTw0bPb9s4RVy5zPCAuBDZog:SuwpFTA4/2/DYGLuY2LbPps4OtC/dog

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

mtf.wiki:6606

mtf.wiki:7707

mtf.wiki:8808

Mutex

5fMCOVMxE37C

Attributes
  • delay

    3

  • install

    true

  • install_file

    mtfwiki.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2432d3c26f9cc527403a4fc1f6a7d8a9e8646cc220660fa408cf8613de7b7001
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections