Behavioral task
behavioral1
Sample
93cd731eed51206fecdd8256968f39f07ba9d95087570d076a355bcf2012394c.exe
Resource
win7-20230712-en
General
-
Target
931af927bf70f23642d23b2445ae3d2c.bin
-
Size
36KB
-
MD5
9c76f329c221fa46b9addcbc46209f35
-
SHA1
a0beba8eebbb7c2972c4b2ba9e8ab98fdb065857
-
SHA256
b61d5277e3ba5bacb26f2ec60318f4c63e5c6e8751b9ffba2fa21e79a7013057
-
SHA512
07f13639b8833bcdb359ec82a848c91c372408f93040d08364c98865856a3100297efd8cf61211b9151248c79113f1e7ec99656579b69ff4d6f3db61490b7fbf
-
SSDEEP
768:bF9h/8GfPG16GkUCdAK5lEQzW1KU/N0n3pyZH/0QSZwuohaM6O/dOQ:p/PP++LLPEiW1KFnwWwl16O/0Q
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/93cd731eed51206fecdd8256968f39f07ba9d95087570d076a355bcf2012394c.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/93cd731eed51206fecdd8256968f39f07ba9d95087570d076a355bcf2012394c.exe
Files
-
931af927bf70f23642d23b2445ae3d2c.bin.zip
Password: infected
-
93cd731eed51206fecdd8256968f39f07ba9d95087570d076a355bcf2012394c.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ