Behavioral task
behavioral1
Sample
1536-66-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1536-66-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1536-66-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
77fc3049a033a4e792c0203b2aab3d6e
-
SHA1
a18eb0345c9a72a928fab2646eb2fe46c8d21496
-
SHA256
62b7a5fc8cf6500077c309dfb89c98180400d4dfddc7999c8837d6d9a85a9d27
-
SHA512
fce92155f619995dcc813848686031e684123a0c1fca036b2f24d79af1766b986b50ff332bad3f281097e3d6b962c477389097a7a906fecc63ddf5bed932aa8a
-
SSDEEP
768:p+4UlO6EWI7BYC8dY+uTlNjV9YLRi9Zm6gCigSCvDmqb2nIprb1o5Tama3LAEB:M4Uk6E3gmYCbbXrMuma3ME
Malware Config
Extracted
asyncrat
Wom 1.0.7
127.0.0.1:22
188.227.57.46:22
ptmnabmqixobpn
-
delay
1
-
install
false
-
install_folder
%AppData%
Files
-
1536-66-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ