Behavioral task
behavioral1
Sample
f316db30e3a572b84f35cf5317c83078eeca9e61c9e954763278758d43d340e0.exe
Resource
win7-20230220-en
General
-
Target
c5a1c573f399e60294a6c9cc4f5795b2.bin
-
Size
22KB
-
MD5
2b188db37b642384a3375dbccc94c834
-
SHA1
a3e8981b82367a815eab6077fe1993a687e8c2bf
-
SHA256
a648a07c0ca551b5e645f90e2ec783a130969730a9e551487402374fa8801110
-
SHA512
65d1e8fff242a1c0c53226ebcbf7c4d65b2c823e1dc3b73f617513541bb3d374936f9b4d2e3887497f3e168d3a9dbd0a31a678ffccbf555947391626843d9e41
-
SSDEEP
384:oNqxG5YYP6HWCB9gnJAer7qeHOP400uYsc46S/CtQ3GAzRB40hbI4Sq/FvALUCZ+:pxGbQ9gnJyDQ1jlFoRBvtSq/yJctQa
Malware Config
Extracted
asyncrat
0.5.7B
Default
jajo0.ddns.net:2410
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/f316db30e3a572b84f35cf5317c83078eeca9e61c9e954763278758d43d340e0.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f316db30e3a572b84f35cf5317c83078eeca9e61c9e954763278758d43d340e0.exe
Files
-
c5a1c573f399e60294a6c9cc4f5795b2.bin.zip
Password: infected
-
f316db30e3a572b84f35cf5317c83078eeca9e61c9e954763278758d43d340e0.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ