Behavioral task
behavioral1
Sample
4896-2011-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4896-2011-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4896-2011-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
dc2d754d2a6c26756906961b46525361
-
SHA1
9b8fe4cb5d61d670f01ede34625ad8666cc3638c
-
SHA256
529de828727b879c579dfdb8cdce81a6afcba2172695447f279bbb3ce3552d07
-
SHA512
e18e9809fbe46e8b240895345308eb7fbedcc58e5a56f810d0189165f4a907e94f39a18f698fc490bd63b66544343eb03df716871d3cf0a963e63e3e97ecf87c
-
SSDEEP
1536:wugKNToTdQT2O/rdCayk5bfywhTy952CPddtH:wuguToZS2kCayAbfpQlH
Malware Config
Extracted
asyncrat
0.5.7B
System Guard Runtime
85.105.88.221:2531
System Guard Runtime
-
delay
3
-
install
false
-
install_file
System Guard Runtime
-
install_folder
%AppData%
Files
-
4896-2011-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ