Behavioral task
behavioral1
Sample
636-1457-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
636-1457-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
636-1457-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
ecdcf3e5d550f7bd5f329ed3e72a41b8
-
SHA1
27dea12d443ac6000f8944fa98276e52514658ca
-
SHA256
65544bf3bbb07d16ca07b86865a119db8b3a34f2c90f5eb796faf83d30001a56
-
SHA512
89c0daeff3861190b56fab818de1726822db1b68b187e8e53de9a29e52134edf9133b1b4d477f98e3c6672e3923af93864a40e56933be9f26a3d15bfc981900d
-
SSDEEP
1536:Ku6XdTv2V2mIVxkLcjgQby37VdQnGidgx:Ku6NTv2V2cLcjhbyknGiqx
Malware Config
Extracted
asyncrat
0.5.7B
War
95.173.247.110:8806
lastcük
-
delay
3
-
install
false
-
install_file
WinSMExp
-
install_folder
%AppData%
Files
-
636-1457-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ