Behavioral task
behavioral1
Sample
715f6f9aeaae1d34865039204dde4be900555a8e6c573d884707f6dc39ffb7c7.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
715f6f9aeaae1d34865039204dde4be900555a8e6c573d884707f6dc39ffb7c7.exe
Resource
win10v2004-20230621-en
General
-
Target
4d8f961dc3396fa19c5e39e43.bin
-
Size
23KB
-
MD5
d3061087d4a54da399cf9856d50057d0
-
SHA1
948a94df0d3e2211db4ea68728e445327801ad41
-
SHA256
515f4a1c7e4490a059624939fb259dd18817d9637c7e159e27322ee6e60a33f8
-
SHA512
414eefb34bc8a8f91b5335ca7a117a17083d2519a56969172b12d7a88302f2d843868ecdb2182e0f037aa859ef66fe707b52201600804039a15b5b4f312ce7a5
-
SSDEEP
384:MSTSF15UnYg2ssTyQt8kTyOIifSbr0RzIYr4KfSB6Ikhs6fKKqTXrdv/Rpr5:hTSpUissTnzItv0tIYr4KIpgGTbdhpr5
Malware Config
Extracted
asyncrat
1.0.7
22JUNIO-RODA
20.200.63.2:2525
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/715f6f9aeaae1d34865039204dde4be900555a8e6c573d884707f6dc39ffb7c7.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/715f6f9aeaae1d34865039204dde4be900555a8e6c573d884707f6dc39ffb7c7.exe
Files
-
4d8f961dc3396fa19c5e39e43.bin.zip
Password: infected
-
715f6f9aeaae1d34865039204dde4be900555a8e6c573d884707f6dc39ffb7c7.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ