Behavioral task
behavioral1
Sample
0471994d95609f0e7fcb0b98e9845f8e85890b186b26b12797ed28af0e30b185.exe
Resource
win7-20230220-en
General
-
Target
65b404da28a5710395d490a148ea6435.bin
-
Size
23KB
-
MD5
0aa1196f16dc339be576676ce4cfcaa6
-
SHA1
96b4ed17e4728f505d9341aef5726a0e038d3f4e
-
SHA256
3ef88870dedc4518247a77fbbbb730844c851d08b38367301c0d00774a3dd161
-
SHA512
60fafbc31b86dcec98f3b3d4f635637911570277f5fdc1729726b876112110aa428151ca76a601463d6d13a565b582b24b3781d499ed1c897738a725aadea35f
-
SSDEEP
384:uFD9m2kI/9r6O1HEuCbd/n69oOBkdY3g1aAHJo4julQFeeN3wfQeiXkIwoxJ6vnp:cDp/sluCbdv69oOBL2vHJo4juleyfYwl
Malware Config
Extracted
asyncrat
1.0.7
Default
neweraimporta1.duckdns.org:7575
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/0471994d95609f0e7fcb0b98e9845f8e85890b186b26b12797ed28af0e30b185.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0471994d95609f0e7fcb0b98e9845f8e85890b186b26b12797ed28af0e30b185.exe
Files
-
65b404da28a5710395d490a148ea6435.bin.zip
Password: infected
-
0471994d95609f0e7fcb0b98e9845f8e85890b186b26b12797ed28af0e30b185.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ