General

  • Target

    596da48ad04336a65137ab69c3fca6f0fe464570f4f233a93e08219c77f33cdd

  • Size

    175KB

  • MD5

    b5efc1ad3ee55805cbc988836d11f425

  • SHA1

    557831f0b3d0eb3831577012f510bead6a4a5a86

  • SHA256

    596da48ad04336a65137ab69c3fca6f0fe464570f4f233a93e08219c77f33cdd

  • SHA512

    8c65fff32ef735cf497cee1a2e221391bf9580c8b21a6d48999a81f7ffbe51f8b641f0337f917a190876080a7341766f51b0dd5df4b28156a1d752918002dba3

  • SSDEEP

    3072:Re8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTMwARE+WpCc:N6ewwIwQJ6vKX0c5MlYZ0b2l

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7829358600:AAF97DhlqJXtfqQH1HgTlToqGZwfPZ8KLwg/sendMessage?chat_id=7538374929

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 596da48ad04336a65137ab69c3fca6f0fe464570f4f233a93e08219c77f33cdd
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections