Behavioral task
behavioral1
Sample
xrzHYtQU13VV.exe
Resource
win7-20230220-en
General
-
Target
xrzHYtQU13VV.exe
-
Size
47KB
-
MD5
4f093330c1644c8f9abf643977199095
-
SHA1
955ce32f6bd9006da9fd13b0957dbd36a66251fa
-
SHA256
f1cb697ff2a65bdfff84178ce8ca769f9c68e960afdaef165cb9c01196199a68
-
SHA512
9c4b2daffc773301e105a6467707ffb1106dae20844bc49aa98568aa048b4cc50529726e16b9309f3cfdb2dc8b564ec1f96a0e420aad2069b69b915b10719ff2
-
SSDEEP
768:Eq+s3pUtDILNCCa+DiPsMmaCVi/G8YbTge5fGY+YYZDKvEgK/JDZVc6KN:Eq+AGtQOWZzzbMqfl+YYAnkJDZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
rick63.publicvm.com:5900
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Files
-
xrzHYtQU13VV.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ