General

  • Target

    0fbc9522bea75aaa0af04e252a09206170b17ff4811a930fe2a0c812a48c2382

  • Size

    48KB

  • MD5

    e48fe350eb0aeb4cedafd2c9ae689c96

  • SHA1

    d0fb07d47835b00d21d258dbcc0e673d1c1ae861

  • SHA256

    0fbc9522bea75aaa0af04e252a09206170b17ff4811a930fe2a0c812a48c2382

  • SHA512

    a9f5b762f7688ea06a72475beeb61b3bbc6d726122e470f6a6370c1c3c4fea4e85d5fc697843eb745ca5f079f0103a2500af9b669c886143d514631165c032b3

  • SSDEEP

    768:OuUjVTwkbBHWU72ZcFmo2qj7bYZC25vPIk9vOfk0bmu1mF8hS+0FO2eefEBDZJS7:OuUjVTwA4M2vZC+ok4fHbm2S8hS+UfyG

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

Mutex

9GqQYIlq5eZK

Attributes
  • delay

    3

  • install

    true

  • install_file

    CheckerAVT.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/63vbbiAr

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0fbc9522bea75aaa0af04e252a09206170b17ff4811a930fe2a0c812a48c2382
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections