Behavioral task
behavioral1
Sample
768-315-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
768-315-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
768-315-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
c37681656d51b7901078ec4f17180378
-
SHA1
283db65f27c6863b23cca98edd4ec52bc59c0aa1
-
SHA256
5030f778c18c41c408b2e6563cda8141e294e14c209b9a31993e3786260ad7b7
-
SHA512
44ad9b009e7b22243e705b992b9975bcec2b3dc8948141bcad41e4b2deb314251234596dbba53f5afe891df1f46855b798d2ffa52706281e525da7ec302b450d
-
SSDEEP
768:LqdpXbXX0fIAkOicvHk3eHlWMPbPgF0q0O0iJNQVTHlgBYI6OCC2tYcFmVc6K:LtIAXvZH0ub4Frv0iJNQU6OnKmVcl
Malware Config
Extracted
asyncrat
0.5.6A
45.74.4.244:6606
45.74.4.244:7707
45.74.4.244:8808
servtle284
-
delay
5
-
install
true
-
install_file
wintskl.exe
-
install_folder
%AppData%
Files
-
768-315-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ