General

  • Target

    2d928d57b8ff1b3414001e22475a45fd.bin

  • Size

    33KB

  • MD5

    44144fdbeb88854f1ac378876a2dbb0b

  • SHA1

    8f96fdae7fb368b72dd0361456563765fc86491c

  • SHA256

    f3118eb4da8b6ef78293f4ddaa1c9a6e28221f7c23b554ee4098ab2797200a12

  • SHA512

    38c11963c81bcc118171a546413634120e6d1ad3497f3191e593f78115e73e03ba3067af0e099be4e4ee25361e112a5d787884e59a83684214345e487032ca86

  • SSDEEP

    768:MozuoDFG9bWXI8IZ/AKlxVER+Eywg6o+VPkJbQucSa:BuuKKXu/hXER+6x5gb+Sa

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Xchallenger | 3Losh

Botnet

1

C2

207.231.111.146:7707

207.231.111.146:8808

207.231.111.146:0077

207.231.111.146:0007

207.231.111.146:6666

207.231.111.146:7777

207.231.111.146:1996

207.231.111.146:2106

Mutex

AsyncMutex_43520e43afs

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2d928d57b8ff1b3414001e22475a45fd.bin
    .zip

    Password: infected

  • 23945d9be12e6b34aae896ef68d098f922b1f972e3d85f499d322192187fd6d2.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections