Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20220812-en
General
-
Target
payload.exe
-
Size
115KB
-
MD5
850cf7de6371c4b69015ffe00167dfde
-
SHA1
8bbd958d4920854f69f3db6dd80163cdafa2fb3a
-
SHA256
e5b7fd44374ca6eeab6de255d2f3a379dbef68a8fad0fc3aa34b746172a22758
-
SHA512
3a1781c0b6cace00d4b45c37fc66d1ffe41f772ad98b5d8c0cb6ac5478fc8180354de713ecb4c12a4791f230f6d9d414088b00eebccaed1a57297583c459c874
-
SSDEEP
3072:17KNH3gaQmZjT4wXbxgKzKhIofLgxZd+yLffxGz5l0Wkm0:17KHww4YbmK2IoSbTfZGz5l0Wk
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
nasori.ddnsfree.com:6666
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Files
-
payload.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ