Behavioral task
behavioral1
Sample
d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc.exe
Resource
win7-20230712-en
General
-
Target
ccf16ec83b2e2d77d5d0e3c59a047b87.bin
-
Size
23KB
-
MD5
34d17580ac5b995076c0fdd6adc79bd8
-
SHA1
3973f5907c2cadc5a806cc8f322e38ab802eb803
-
SHA256
63a41afe24da847baf881a52ddfe511fc0e3fa283f4e7b3fa9a23b52aa702a72
-
SHA512
8a192f2d028efa3119237cff292182ca0f2d83af2d1e5a62bbf93a71341a97251086f73adfab0a97817449580ea064c1ce1a11c4fc735bb0c22a3d93e11ac6ab
-
SSDEEP
384:P509mMVg2NEGjjPzNrjland22jeAbd7u1KUqqKERh0gkfde3YlJ:PwWGjjPhrsMIeCS1K/EjFkV1
Malware Config
Extracted
asyncrat
1.0.7
27Jul
tttmundo2022.eastus.cloudapp.azure.com:2225
DcRatMutex_uuhrstr54645w3tr
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc.exe
Files
-
ccf16ec83b2e2d77d5d0e3c59a047b87.bin.zip
Password: infected
-
d45f14f2b2ac33d6f763d35f8ec0aa8bc531fb5a683aff22d70fa263dbcbf3bc.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ