Behavioral task
behavioral1
Sample
1792-17-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1792-17-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20230831-en
General
-
Target
1792-17-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
cc70ac0bb909e8a59b1643299b7779d3
-
SHA1
b97ba0bff9c8d7ba3347bd1d20c7fa18cb7067ef
-
SHA256
d4b01b47cb8e694df2788749dc023ea7c93898daac598d5bddcd0eb6fdeab532
-
SHA512
defe36aa6a1d94622a5ddeaa76a85dac7b896e3a3318560b566577dc266ce8349e7f2c34f1a15a7b0ff199ffb6299f64ee9b800b7b265547fdabdece57f77ec1
-
SSDEEP
768:zuSU6ZTAY+TiWUUj+zmo2qLAVzklfIIPIhZjbEgX3iZQ8vu2mBDZ:zuSU6ZTAhM2HV9hZbLXSqJbd
Malware Config
Extracted
asyncrat
0.5.7B
mass_spread_july
mass2023.duckdns.org:2023
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
1792-17-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ