Behavioral task
behavioral1
Sample
karem.exe
Resource
win7-20230220-en
General
-
Target
karem.exe
-
Size
62KB
-
MD5
34d62490ecf337eada11aa8f90ffdabf
-
SHA1
1aac3e9ecde1c3b674a4aba43d3833fbbda9bfc5
-
SHA256
c6ada96fa95451681c77f79ebd9c9f40a7a0e2d088d9d1fb46c3f650324b212f
-
SHA512
0f1be6d88ebe8dce639b7d339f0347cb19b3a74c73b43416d567301f70e4502e276b10944dabb9a0128e608ad3faf353fe57cf73906c8a9cb3c201ab271809dc
-
SSDEEP
1536:wDKDtaNosCq5Gn9v+Schqpqbw+UpYyZOq75x:wDKYNoxq5GnY7hfbw5nOqdx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Move
kaka.publicvm.com:2222
AsyncMutex_move
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
karem.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ