Behavioral task
behavioral1
Sample
1936-188-0x0000000000400000-0x0000000000414000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1936-188-0x0000000000400000-0x0000000000414000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1936-188-0x0000000000400000-0x0000000000414000-memory.dmp
-
Size
80KB
-
MD5
c1317a05a940b08fbce91f330d0196ff
-
SHA1
14e155fea9d5fb10ff558c7101775c027fd7f4b7
-
SHA256
06c120cae01be745d66f87303549789ee167024ca9048657c730e9c5c20c7212
-
SHA512
cbca15a9d9c08ba5de5fa299e66d589328d8886fc8e172b05457a46e17db7450d5065bbbe0dce2d596d2a1fa9ec1be1fa9ad20273f2e6f347371c52936c907e7
-
SSDEEP
1536:tvKDtKNvPmE5OMT3wLHmKb21tszqDq7Ex:tvK4NvOE5OMzwLGKb2vDqgx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
185.81.157.244:6601
AsyncMutex_6S181I8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
1936-188-0x0000000000400000-0x0000000000414000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ