General
-
Target
dcratt.exe
-
Size
63KB
-
Sample
241211-1y36dazmhx
-
MD5
58efa839d0d139bcfa6af4e1ea77ccf3
-
SHA1
b9558c3f42724ee4a5442bc98bb5107fa8cc9a48
-
SHA256
fd0159f07670e56444d3a919127a644f960e1d4ad24779a23459bdbfdb0db6bb
-
SHA512
8a839734bef3f3b7c5cb365c413d95d607875446a73fef50fc30c6f81031ef9d0be8a227b4d0c199d6f6dc7720ce85ac68505fe2fbbb26837af907d52b543a47
-
SSDEEP
1536:UhjExLDRwQuNMXbmaeWs1lRIZaGEGbbkw7etI3ZGxZVclN:UhjExLDRwQuNMXbreFliZavGbbkmm8os
Behavioral task
behavioral1
Sample
dcratt.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
147.185.221.24:4580
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
dcratt.exe
-
Size
63KB
-
MD5
58efa839d0d139bcfa6af4e1ea77ccf3
-
SHA1
b9558c3f42724ee4a5442bc98bb5107fa8cc9a48
-
SHA256
fd0159f07670e56444d3a919127a644f960e1d4ad24779a23459bdbfdb0db6bb
-
SHA512
8a839734bef3f3b7c5cb365c413d95d607875446a73fef50fc30c6f81031ef9d0be8a227b4d0c199d6f6dc7720ce85ac68505fe2fbbb26837af907d52b543a47
-
SSDEEP
1536:UhjExLDRwQuNMXbmaeWs1lRIZaGEGbbkw7etI3ZGxZVclN:UhjExLDRwQuNMXbreFliZavGbbkmm8os
Score10/10-
Asyncrat family
-
Renames multiple (4486) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-