Behavioral task
behavioral1
Sample
55c51b45267d61bbd994f135ea87add0.exe
Resource
win7-20230220-en
General
-
Target
55c51b45267d61bbd994f135ea87add0.exe
-
Size
223KB
-
MD5
55c51b45267d61bbd994f135ea87add0
-
SHA1
5d6a15e373008b1f0fbafb763385568d93499002
-
SHA256
e8e7259207aed56b83cd1b5ff9dd85fb31b03001e8044e41707d97730a5fe72a
-
SHA512
742f7e473287cdec537bc6aabba7b373753b5384a4dd2d83be67410ad4a0a8a5e41f6614c8ce352e609b6de3e7075af2c01acd8c8ff673704d38ae89a0ca7f0d
-
SSDEEP
6144:Wwg+t3rtwtOHWSIGbXddfS/zB5gsWdkr:Wwxt3rNHWxodUzBKsbr
Malware Config
Extracted
asyncrat
0.0.1
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
104.238.147.18:6606
104.238.147.18:7707
104.238.147.18:8808
https://api.telegram.org/bot6288147390:AAEaQec7zMvW6luY8UWV4rrPbj5q4jBpAvY/sendMessage?chat_id=2023484619
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample asyncrat -
Asyncrat family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
Files
-
55c51b45267d61bbd994f135ea87add0.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ