Behavioral task
behavioral1
Sample
1016-55-0x0000000000490000-0x00000000004A4000-memory.exe
Resource
win7-20230621-en
General
-
Target
1016-55-0x0000000000490000-0x00000000004A4000-memory.dmp
-
Size
80KB
-
MD5
e9e76919cb5f38b4ade710a792294bb2
-
SHA1
a4ca3ffc9c9d65b7d30d640e850f0cf7e9d0018a
-
SHA256
091268f3ccb94948de8ac420527e7ad2a79f550755a85c8078e11acc66f54f40
-
SHA512
c20c3d439e26cb022754e7f96dc70bb2c3d9274e87ec3a8e303c22e1f019817abd0eabf4a8b1613bbb4b3a85768d5bbf161b83ebc19a9c19c40b765b123c6e75
-
SSDEEP
1536:/hjMxLDRwQuNMXbmaeCs2lheeCglUGbbXw/N6RGrtpqKmY7:/hjMxLDRwQuNMXbreKlEep+GbbXcNB2z
Malware Config
Extracted
asyncrat
0.0.1
Default
7593352b2g.imdo.co:28870
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1016-55-0x0000000000490000-0x00000000004A4000-memory.dmp
Files
-
1016-55-0x0000000000490000-0x00000000004A4000-memory.dmp.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ