Behavioral task
behavioral1
Sample
4356-170-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4356-170-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
4356-170-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
22108173c441a77b9d6b8fbb865db8e9
-
SHA1
c98f0705b8c5d62ce9d6496924b20630c560ec46
-
SHA256
0fcd3439d2e990aee56cef6c8495abe7dce05774ac0d0ca5fb9c3a05059fb031
-
SHA512
a15ac96cbd27338a9fb67d873fb8239ddfc207339bd9b215f476df74bdda4d06b4329d949933a7ee4a7b680e6c15560319fae459a3ef5db6ca767ae7f0741b71
-
SSDEEP
1536:4mfWSqHdykrVMKuJUYFz8Vob5b3AP3pnvlGIzrQTG5x:4meSqHdykGKuJUYFQ6b5b3ovlRGCx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
45.80.158.237:5558
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
4356-170-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ