Behavioral task
behavioral1
Sample
0x00060000000231c7-271.exe
Resource
win7-20230220-en
General
-
Target
0x00060000000231c7-271.dat
-
Size
232KB
-
MD5
b322016149eb06ae727524dc17c2f631
-
SHA1
890c2ebfd66f9bc72fc5e68ec667f25c74fae633
-
SHA256
a3ce8f441abbbea97d7f9bd4fe968cc05612e4810c91c5036e84ad53f1a3738d
-
SHA512
eb1da37182dfd279e39bf406310469b542d90a55b18599dd4e53f51ee76e0e37de88cde8d4cdfb3b9759e83f385fb38338f2ba120f313bf306c9d18df47a5225
-
SSDEEP
6144:kDubaBBOBIIj6HLLYLCYJqvc1Dqqk0AonP1HboHmw0bzlELV8SMad:1baZ/2UHa/lEpTMa
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample asyncrat -
Asyncrat family
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule sample family_stormkitty -
Stormkitty family
Files
-
0x00060000000231c7-271.dat.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 230KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ