Behavioral task
behavioral1
Sample
b0e1d8b8115f50b5e89ad950bb7f9d6df0c540c3eb8706656de8c3eb8992a690.exe
Resource
win7-20230220-en
General
-
Target
3fa054547e799d1b85f696a022dcee97.bin
-
Size
35KB
-
MD5
39316ccfbab1489e4f8c17400ce92608
-
SHA1
e32a25bfd704b2695c2d08ef59899d8aee2f43bb
-
SHA256
fc05e5cd11591d54d3a04c491a2b6fe45e89d219b92b0770362078c9bd1f22d6
-
SHA512
6e911e5eb4e5fd0177bceb1759c293dc166a5af351d3218844a1362207a1803f78b9dd84a5022279aace84fdc637d33d36f6ecb9bcb6471275bb561153b3a64d
-
SSDEEP
768:46sgp6GKca2eZcskeLsPBPk4kCCFMuEAUXhRFX:46shGHskeU84OFMDrRRd
Malware Config
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
Default
20.150.193.28:4449
ahnnvyvqpiuvrpgqxnl
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/b0e1d8b8115f50b5e89ad950bb7f9d6df0c540c3eb8706656de8c3eb8992a690.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b0e1d8b8115f50b5e89ad950bb7f9d6df0c540c3eb8706656de8c3eb8992a690.exe
Files
-
3fa054547e799d1b85f696a022dcee97.bin.zip
Password: infected
-
b0e1d8b8115f50b5e89ad950bb7f9d6df0c540c3eb8706656de8c3eb8992a690.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ