Behavioral task
behavioral1
Sample
3144-172-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3144-172-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
3144-172-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
7c183e2232ffa7c6b3319983d6cdeda7
-
SHA1
32553b5966646f731575f6d3346750aa88969656
-
SHA256
008fa98c635e61620c65f85d59fcab6ce1edc66e5ca10397c3fb9b75a6b88f43
-
SHA512
f7527e7ac564f4f1039a0aa5dcc2300f2daab56610980fd282e1edfc62d5cbd8732f6ab7e20604d39496dc115c111db7580ae9f823c8038b9b010522759e8caa
-
SSDEEP
1536:4mfWSqHdykrVMKuJUYFEOOOxqbpAPdErQTG5x:4meSqHdykGKuJUYFceqbpUEGCx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Forward
45.80.158.237:5558
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
3144-172-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ