Behavioral task
behavioral1
Sample
904-56-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
904-56-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
904-56-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
fe5be4df3591479ec1e93a29d1b949dc
-
SHA1
100bd3c1ce6bb00c8266f85ce522742b85dc73ae
-
SHA256
f0e2d58a2b4a0e8f99aa6c34cc1da8609de9ab16197c5abc0094e6ec37f332bd
-
SHA512
af9cb986e392faf176fd3c4e32c6cd50444a8fab8516132e047b432253b18597c6bcb24acb3e5a981170ca1d44315fd1d0a41e7547ce7d7217359d1b82bb0ac1
-
SSDEEP
768:gq+s3pUtDILNCCa+DiTSniWO8YbagVQfNpDvEgK/JHZVc6KN:gq+AGtQOmmzbNQNxnkJHZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
vcnnxfdf.duckdns.org:8026
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Files
-
904-56-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ