Behavioral task
behavioral1
Sample
1852-217-0x0000000000270000-0x0000000000780000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1852-217-0x0000000000270000-0x0000000000780000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1852-217-0x0000000000270000-0x0000000000780000-memory.dmp
-
Size
5.1MB
-
MD5
75f5151a5aa7919c9c9887eb95f5b9f1
-
SHA1
2836caf5b198f585b512f7a8419c58744774bd39
-
SHA256
ae8cb612850b8eff2313e5e2f19230956e18890b5a3cb760fa347653169c9f7e
-
SHA512
0e486a13377401a27db9ed39f3ee0eab78a37442bc5e05d8961e88aaba8e8b04b51727efa75f768a293bcb2cc1d99a7648cd7ec6f930149df6340acaeb6f1f69
-
SSDEEP
768:QuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3iLmsH8gR5kGRKBDZLx:QuwCfTgp/2OKYDy3bCXSLDLgdLx
Malware Config
Extracted
asyncrat
0.5.7B
Default
37.120.210.219:48408
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
1852-217-0x0000000000270000-0x0000000000780000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ