General

  • Target

    a006c8275340b27e4d47e12ffdc5ae0a4384a54afbcba2be4bcd5a9e9cdfa9c4

  • Size

    63KB

  • MD5

    3b6ac506e869c2f6666ae5e6968b95d2

  • SHA1

    34b1233c3064f2671673a49ecd0f8b303b26494b

  • SHA256

    a006c8275340b27e4d47e12ffdc5ae0a4384a54afbcba2be4bcd5a9e9cdfa9c4

  • SHA512

    632a1088718fb15e2c00f682ed152e0f290c85e33d1f4222afcc303f4b17a76d72716aaa6e3f371033d170ca72b22e74a89a1f40817b5b5be7db0c913d3b0a43

  • SSDEEP

    1536:mmImx6tX2kNff4sKu+UYFXQ4qw5bUAPQav6kBrQTGJx:mm9x6tmkN7Ku+UYFgPw5bU06kBGSx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

SERVER

C2

asyys.duckdns.org:52350

Mutex

AsyncMutex_6SI6TOGjnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a006c8275340b27e4d47e12ffdc5ae0a4384a54afbcba2be4bcd5a9e9cdfa9c4
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections