General

  • Target

    Client.exe

  • Size

    48KB

  • MD5

    77ca225fb7c84aad1e8ee9ead0110b4c

  • SHA1

    b26e40f8e945f4db6621d7ca5a575a84c0565f91

  • SHA256

    716b12fa63c467b57e24182ae3af25b738fc589f3f4f0aa5c516190f3eefbf00

  • SHA512

    e8f2138cd82714ba58a30d9b48c7e61a6c42b17db297c332e078db544575404382ccf16dbd5bd0aced9342186b05b65a1da0426062b10729a40123a5887e3bbb

  • SSDEEP

    768:ywpRILv+sx+LiEtelDSN+iV08YbygeYslsoo7RSYFr0bvEgK/JfZVc6KN:ywcpEtKDs4zb10rqjF4nkJfZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

127.0.0.1:59953

fojeweb571-59953.portmap.host:8848

fojeweb571-59953.portmap.host:59953

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    windows defender firewall required.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections