Behavioral task
behavioral1
Sample
4332-154-0x0000000000400000-0x0000000000414000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4332-154-0x0000000000400000-0x0000000000414000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
4332-154-0x0000000000400000-0x0000000000414000-memory.dmp
-
Size
80KB
-
MD5
9fb1b0d245ea10621fb05dff7e12f0b0
-
SHA1
73fb5f58112055a447e8c1e444539151e1ccb2a5
-
SHA256
79b616f6f007c51875871be0c329618b2efbe9511d2ddacd3a3559a9947ba0cd
-
SHA512
da3fbdfb321725114ec8a6a3956b904eb6d55d148703888b95a44bf4dbedb7b7a582e811d6b1b784828a1974d711a42bb0e6b230d98b93a571b123c8ff7ff731
-
SSDEEP
1536:wwHa95Lv4GBu6cxH6Gs+5/FI6abnbgK5+/VbjVtK9/x:wwHa95Lv4Uu6cxH6G5a6anbR50ppYdx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
23-09
mo1010.duckdns.org:2020
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Files
-
4332-154-0x0000000000400000-0x0000000000414000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ