Behavioral task
behavioral1
Sample
unpacked_async_clean.exe
Resource
win7-20220812-en
General
-
Target
unpacked_async_clean.exe
-
Size
88KB
-
MD5
3623d6bfe03089a47b8b7237dc668cf8
-
SHA1
6a246157bb955d1e30511c1d01809c8d3569e713
-
SHA256
e8dd6ca9125d656f8243da0a8224948b838a87c2200c247ea5e3b28ede034488
-
SHA512
cb27f5d4699d50b053d87e12d4c17e9329cc936e58302dfa276ae57257c228b0fc5e3d0624ae00182e5d962d3834b9c7ab29949906da2df0e5214b02cc294b02
-
SSDEEP
1536:pwrecK+fDpVTW+kGTFYGTJhbuZPWxUPXVmLbox:pwrecKuDpVTWWFYGfbuW8mLcx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Bypass
red2056.freeddns.org:6606
red2056.freeddns.org:7707
red2056.freeddns.org:8808
AsyncMutex_red
-
delay
3
-
install
false
-
install_folder
%AppData%
Files
-
unpacked_async_clean.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 64KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ