General

  • Target

    Dc.exe

  • Size

    47KB

  • MD5

    ff744d24089c2b37d56b4483c6db217a

  • SHA1

    4de25b3c976c958aa83d868ee4e8f891b1df1ef2

  • SHA256

    3afbdfdaf9738f85294d3b1179e6e3200b8aeccfb38b9caf8dd6c25ac9f5bdb8

  • SHA512

    fa84b86856665619b2a720db84c92beacf0dcbca976cc29ed2018a7d07afab6a2d29e4d07dc060a5a98e029adcdb6d247e4585bbf59fdd75be4c00721234ddbc

  • SSDEEP

    768:Zy+0zzILMmY4+jiRUvi56lxYbIgezKD6cGpIvEgK/JDZVc6KN:E+SQR8sbfzD6/InkJDZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

necatisoff-36486.portmap.host:36486

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    wdf.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Dc.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections