Behavioral task
behavioral1
Sample
2044-64-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2044-64-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
2044-64-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
548b3cced8c9a59b6ed32ebcb7434310
-
SHA1
0731bc26750ce9e396005031efec1e1c4d7ebe52
-
SHA256
257c5c16e0ad73fa8f59161f5d8670511a40fcbaa54eab650c8f350571d70e31
-
SHA512
31b46d6cb868b91ff6d9824c82a9506aad18cab9fd9179f630259865abbd43a11c49ffeed53e47618e425188878e68ed1659270530c4cc71dd6c0597e8a32183
-
SSDEEP
1536:wugKNToTdQT2O/rdCayk5bfywhTy952CPddtH:wuguToZS2kCayAbfpQlH
Malware Config
Extracted
asyncrat
0.5.7B
System Guard Runtime
85.105.88.221:2531
System Guard Runtime
-
delay
3
-
install
false
-
install_file
System Guard Runtime
-
install_folder
%AppData%
Files
-
2044-64-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ