Behavioral task
behavioral1
Sample
9a6aa7bc60f817e2c0761373100d5bb22207847da7d8452db757b17c03c18c9c.exe
Resource
win7-20230703-en
General
-
Target
758234189af5df0fc8ef3aab2cdef50d.bin
-
Size
28KB
-
MD5
d8caac48b1d9d467f2f81129fcfe6814
-
SHA1
d2e58f036d496f8f3c5059d9ce1ff6739a21ab31
-
SHA256
352ac79640a84df0ab4468c1a6dee2d5ee4b74d52f7691243ea083781ae966eb
-
SHA512
79f8f68fbc66c6b181a5c9713e846371d5df77cde3b1c24dc19a6cb905b03d93e1532e5133fbdfe4f1f51532cf6a3074d209bf42aaf737be011c1592b80fb288
-
SSDEEP
768:bUyScQo9c71ck3Vts6rwLYNETr9h58zEcvTtHwEFF3npXMbYgYmJl4q:bUpxo9cZcknrws458zbvp9FF3dMbNYmf
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
electroniccomerceanddatabasesforstudypurposesonly.online:5464
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
file
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/9a6aa7bc60f817e2c0761373100d5bb22207847da7d8452db757b17c03c18c9c.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9a6aa7bc60f817e2c0761373100d5bb22207847da7d8452db757b17c03c18c9c.exe
Files
-
758234189af5df0fc8ef3aab2cdef50d.bin.zip
Password: infected
-
9a6aa7bc60f817e2c0761373100d5bb22207847da7d8452db757b17c03c18c9c.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ