Behavioral task
behavioral1
Sample
c63ce128ee4c0442e303b86d27e3e7df8eff15a04a44ada8cabfa965144ccf56.exe
Resource
win7-20230831-en
General
-
Target
018ed5e21ac44a7bed37d0f30ab22bbd.bin
-
Size
32KB
-
MD5
fd2c42068d97f84d9e1180be44c6d1af
-
SHA1
b91fb13e629f2adb2f2f191d8d342e01cd975a87
-
SHA256
d8d091387308daced66ca46fcba3853a2258265ff221b5862ca435e56459adf9
-
SHA512
6aeb4bd555838cd9bc0fb2e76b5248996d3141042ef1a6d08111b4a1bd3e6fff8056467fe1bbabb732a138f8e52a5e7be0ca892792c8b6cc1dd78c19c93ce101
-
SSDEEP
768:n1H5jSfIsb0qH82rXguvoMYookVUqmlNwq25gs20CjCC0vgww4:1ZjgIVWrrbF5mj65+Djsgww4
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
marli27.duckdns.org:2727
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/c63ce128ee4c0442e303b86d27e3e7df8eff15a04a44ada8cabfa965144ccf56.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c63ce128ee4c0442e303b86d27e3e7df8eff15a04a44ada8cabfa965144ccf56.exe
Files
-
018ed5e21ac44a7bed37d0f30ab22bbd.bin.zip
Password: infected
-
c63ce128ee4c0442e303b86d27e3e7df8eff15a04a44ada8cabfa965144ccf56.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ