Behavioral task
behavioral1
Sample
b5a07ffef279e824561d2fb7c6f3f8f2ce86f8fd407fd091820fa35f4dc3a99a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b5a07ffef279e824561d2fb7c6f3f8f2ce86f8fd407fd091820fa35f4dc3a99a.exe
Resource
win10v2004-20230220-en
General
-
Target
03fdb837e1130cd4e144fb0afcb67659.bin
-
Size
23KB
-
MD5
7164bb057a5aa4b5f9d923590b113b2c
-
SHA1
d09a74c47bc8dedf8d974d2c1c7a7779f3b9b6c9
-
SHA256
bbd129e8092d1fe50b711c7f99a9bf00ad11e2975b94a61a4224d7549da9a0b3
-
SHA512
587e21418a0a06703fb64138b532049506d86549afad39c18693bc0ae635b8af09e3cfd6a3df2d214edec8fc9e87dd953dcef919a2f22464a33553315dc2a8f8
-
SSDEEP
384:eW0ejBw24cDNLH4/e3pX1JUWhB+sTt9LCau4MMhAHMmopE9fHYDe/EwYE0l/7AWA:eW0yhLNLY/6lJ7+s5ZC1MhAHMVpE9yCz
Malware Config
Extracted
asyncrat
1.0.7
vpsruso5JUNIO
185.106.93.148:2020
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/b5a07ffef279e824561d2fb7c6f3f8f2ce86f8fd407fd091820fa35f4dc3a99a.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b5a07ffef279e824561d2fb7c6f3f8f2ce86f8fd407fd091820fa35f4dc3a99a.exe
Files
-
03fdb837e1130cd4e144fb0afcb67659.bin.zip
Password: infected
-
b5a07ffef279e824561d2fb7c6f3f8f2ce86f8fd407fd091820fa35f4dc3a99a.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ