Behavioral task
behavioral1
Sample
2240-70-0x0000000000080000-0x00000000000B0000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2240-70-0x0000000000080000-0x00000000000B0000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2240-70-0x0000000000080000-0x00000000000B0000-memory.dmp
-
Size
192KB
-
MD5
49282caac93ccc4ab27f2d16b23bd67a
-
SHA1
cfb708631d4c2271953944128fd5b1367e075fa6
-
SHA256
f45937b3c66e0e316aab3c9dd522f99c1726a182d309e66f4f6ba9575648c4cd
-
SHA512
057d0aa7f4462d4ecafbad647ce5dfacb13020947078f0bf9a757b527cec5abbd561439b68ee2b2c0d531ad47fc7fecf4762f26b4101c03992c5d1ef8d9b9686
-
SSDEEP
3072:zuojTxoG2TNkVetFmbSZdukwiFUyZn8ip0JNXeTfellRQ:zuomztFmbMwkYnTuTfqm
Malware Config
Extracted
asyncrat
0.5.7B
July 26
donzola.duckdns.org:2000
AsyncMutex_iuykt5yr5ur58n8tnur8herjncr8tk
-
delay
53
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
Files
-
2240-70-0x0000000000080000-0x00000000000B0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ