Behavioral task
behavioral1
Sample
wnPTcjxF.exe
Resource
win7-20220812-en
General
-
Target
wnPTcjxF.exe
-
Size
47KB
-
MD5
a5fb5c7e81a27c6c3eae534f43a592b1
-
SHA1
2cd9211fd8b7e677ecaa14653967e6f641f46ef0
-
SHA256
5d7cd06f61d27d5b9820b0b9ce74f0d69a7eac63aebfc928e0fda7528b609877
-
SHA512
bee8d0f6f691b2eb6346e9a53f5a045993686a788fe9ec18108f035c449bd6c4e6bf4cf1f612e945e39e486c6a91b169bb25374a8cf1049ee8e9594889761bbd
-
SSDEEP
768:dOEuILWCKi+DiBtelDSN+iV08YbygeOW5+vEgK/J9lZVc6KN:dOtmBtKDs4zb1IUnkJ3ZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
4.tcp.ngrok.io:11354
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Files
-
wnPTcjxF.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ