Behavioral task
behavioral1
Sample
700-66-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
700-66-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
700-66-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
9a57576e40ec9e5bad9be5e658d0812a
-
SHA1
3a56709286b2ccde90e247c38bd9f49f7be225a2
-
SHA256
8e1f2e12bbab83c19117dc846e7b496e9e3f119cb333e6034326ce686c5c208f
-
SHA512
8fea6e1b40644cd449fb6cfb72d8e637f30d07645bb31c40cdb3bff39b70eba474b11937af71ada2a6b972c7a777cc27470047da886b23ff0af82699c7cb478a
-
SSDEEP
768:iuu91TwQsOnFWUF01/mo2qDG0dy2P8PImHgBdMbYbaa8Fx6lTI9e40TBGP2qUFAB:iuu91TwSo2F4BmHIbaLj6lWeBW2tb4d
Malware Config
Extracted
asyncrat
0.5.7B
Default
37.0.14.197:7171
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
image.exe
-
install_folder
%AppData%
Files
-
700-66-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ