Behavioral task
behavioral1
Sample
2008-89-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2008-89-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
2008-89-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
d9cc17dfb0b12d9b776e0f51a88cbde2
-
SHA1
109970ac2a8930b48da762237766a3eb4f201670
-
SHA256
6cac0ab812875cfdabeb6874d8a5b813ca2df97c959154215d7d5c336769708f
-
SHA512
5fe3c4544ebc1920ad9c2ccef89080b55ed6ed22145e771ea1e7d508e6d09e772a2b33a6eac28981eadeb82fdc851f80f61c4b14afc60409dd2997a9e8a3dd15
-
SSDEEP
6144:TDubaBBOBIIj6HLLYLCYJqvc1DxIt+Lb/xaHb7wI44xHcI:2baCIYLb8gILq
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5345460701:AAELDlYM_8yHwfKYHoYl_27JYXLpT-SLsyY/sendMessage?chat_id=689992339
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample asyncrat -
Asyncrat family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
Files
-
2008-89-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 230KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ