Behavioral task
behavioral1
Sample
996-62-0x00000000000B0000-0x00000000000C2000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
996-62-0x00000000000B0000-0x00000000000C2000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
996-62-0x00000000000B0000-0x00000000000C2000-memory.dmp
-
Size
72KB
-
MD5
526fb04d95e47fd87ea85dc5d330ae4a
-
SHA1
7194a332fb066507deef598d8009338ad563924a
-
SHA256
c88d1d7ad44f36af5f61747ff073eb6a6bc44b8ec9d9bcfa612851412a4de878
-
SHA512
a8660e6912f705655d3c2e4261ae3614dfa5d314c65429a4a85eb04f28e695171902bb6005357a38b9f0a8fd0f262b71396a46af5bf4571cd1d17b78b2a3c6df
-
SSDEEP
1536:wuwpFTA4I28UWqXIKB2bVmX7b3GZMokdWi:wuwvTA4I28U3XIKkbV0b3Sk4i
Malware Config
Extracted
asyncrat
0.5.7B
FileManager
20.107.115.162:50239
FileManager
-
delay
3
-
install
false
-
install_file
FileManager
-
install_folder
%AppData%
Files
-
996-62-0x00000000000B0000-0x00000000000C2000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ