Behavioral task
behavioral1
Sample
bLLa.exe
Resource
win7-20230220-en
General
-
Target
bLLa.exe
-
Size
63KB
-
MD5
15b1e4daf575c9048aea3bb18b21606c
-
SHA1
ab9f3e0c167fcc4270fcf5489333a652c6cff041
-
SHA256
5f69e57505862bfe9efc097de17ffa99c93eedb60e86b073cbe494b00a2d9a37
-
SHA512
c490e149a1b2006a523dc3ce3bd5fa6048f8de8638dd26f0ce9301fb0468b9dc4f82fdca83f76cab095264e9674da797ccaecd56deb771397e04f244568c0e76
-
SSDEEP
1536:HhYBLTM3Ufc4c7VGeeiMl8GbbXwoZHtGZZVclN:HhYBLTM3UfcVVfeFmGbbXzGzY
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/q7n3RpBv
Files
-
bLLa.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ