Behavioral task
behavioral1
Sample
HEUR-Backdoor.MSIL.Crysan.gen-33315f1d4b95d44aed06ae7fa4cc24cc526e93fe52e6c812b73743dc597c43c3.exe
Resource
win7-20221111-en
General
-
Target
HEUR-Backdoor.MSIL.Crysan.gen-33315f1d4b95d44aed06ae7fa4cc24cc526e93fe52e6c812b73743dc597c43c3.exe
-
Size
47KB
-
MD5
cd56b0b49a59d8ce1f2be08b6d31f571
-
SHA1
8094325b87a9b44a96e717ab3a602d12e2efe0ef
-
SHA256
33315f1d4b95d44aed06ae7fa4cc24cc526e93fe52e6c812b73743dc597c43c3
-
SHA512
3f7a73d745c1276197ea7c6fc23b66142d914da724f70654b0e050f6630cb7f1f43f5156e8ba091973e025249720548aa983c0fbe0f26ca103c7c16a8b4bbaba
-
SSDEEP
768:6u+U1TQQEX1WUVU1Pmo2qjRYfuA6pPIGdqsu0bEqeERyrZ6adZMhi6/OtzAuLBD4:6u+U1TQfI2SxAlG3bEqHyN6a7qi6SzR8
Malware Config
Extracted
asyncrat
0.5.7B
Paypal
192.168.0.5:6606
192.168.0.5:7707
192.168.0.5:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
CheckerPaypal.exe
-
install_folder
%AppData%
Files
-
HEUR-Backdoor.MSIL.Crysan.gen-33315f1d4b95d44aed06ae7fa4cc24cc526e93fe52e6c812b73743dc597c43c3.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ