Behavioral task
behavioral1
Sample
684-57-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
684-57-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
684-57-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
015cb2a56968affb4265ee2a3015f269
-
SHA1
da0c747f1d17b7f129da818c31a5a00cf13a6b8b
-
SHA256
06c69d5a618d52ef28136d25fa45337d2d51e620ba114295b52cae7c3bf3db20
-
SHA512
747ba901fc6d8b2a0d969971f946ddb931e94976ec76aaaf4bf815eafed80ccf4808c78d956a9a9c261b372a513fe8a26a276b4d6d375b51d8e21f18cb5c2262
-
SSDEEP
768:Hu/6ZTgoiziWUUM9rmo2qrrKjGKG6PIyzjbFgX3i3smsysa7YPWmBDZjx:Hu/6ZTgle2mKYDy3bCXS3sRWY+odjx
Malware Config
Extracted
asyncrat
0.5.7B
Default
hicham157484.ddns.net:1994
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Files
-
684-57-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ