Behavioral task
behavioral1
Sample
660-61-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
660-61-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
660-61-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
ded6af8c22e5ce1d0ddf00b18210f893
-
SHA1
4e0538d68032b1b5cbee5df2f56e51ae937ceedf
-
SHA256
b29f1e8c73e6708501235247ba4a7ba7019415cccdee707468682d8b7a8c4768
-
SHA512
c92e9bda414a1c2adbfe3496997ca6c02ea36cfa29dcfffceb0de0baba6e89d7e675c8375e7664d1dc918f85bbc561b5cb1b46e1eb93c544b0b07134c35cdc68
-
SSDEEP
768:5OEuILWCKi+Di2gjMWksLqRSY8A0PiY8YbbgeaWRrOinvEgK/JTZVc6KN:5Otm2XWnDAOzbk+nnkJTZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
192.168.175.1:1800
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
660-61-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ