General

  • Target

    Loader.exe

  • Size

    47KB

  • MD5

    ad44130f8f42acf617c47f83717e1b58

  • SHA1

    b74238ba25a96abfe889d92547d42712da39635e

  • SHA256

    1763700355c9a6a137f72badfbf615c10b16c6b3313b36efd8ba8fc1ea7d3574

  • SHA512

    74966ed6542d3f62f0b2950bd8bebd8f763b939a5f114adfaf5e4f7986047c4ffdc52e88999913ccbbfa34999e32c76e3c3e6a358806f7738b8586e464fa63c1

  • SSDEEP

    768:MuyxNTAoZjRWUJd9bmo2qLzhSTZxvErdPIiwvaLnebAw//FPACqT54KNTUTBDZ4x:MuyxNTAGL2soZxvjiwSjebR9xq44Y1dq

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

kingdom-spent.gl.at.ply.gg:25651

Mutex

mBCDHgobepxm

Attributes
  • delay

    3

  • install

    true

  • install_file

    Windows.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Loader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections