Behavioral task
behavioral1
Sample
payload1.exe
Resource
win7-20230220-en
General
-
Target
payload1.dll
-
Size
45KB
-
MD5
50d6b300ce22da9f608b15b41a388c11
-
SHA1
9ebe111a35e3d719f517139abfa6ccc11555812f
-
SHA256
817c463f2b2d6ad916bd11bdc8e81e232b443d333cb02a3943d28f11d206ccc3
-
SHA512
cc77adadef112b60a034cd384294a7af99a875d767fcd1f29cce8263ac34965b548746bca2e99eee5ff1de54d6d1021e8b8cca21185de3cbb418e7496f967b2b
-
SSDEEP
768:vuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3iyS48JvaBLBDZSx:vuwCfTgp/2OKYDy3bCXSydbdSx
Malware Config
Extracted
asyncrat
0.5.7B
COFFEE
1dog.ddns.net:6606
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
payload1.dll.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ