Behavioral task
behavioral1
Sample
2204-8-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2204-8-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2204-8-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
47887d75f653afabf9c85128052f4181
-
SHA1
0bd8d2578486477135e8f2b41db4fb7a548bdeb8
-
SHA256
2d1c24c2fea1c70ef1d5c8c82d3f8410be32ae5cbebae1ca783c20da794ab741
-
SHA512
47bd3c5dec5ea0088d3414b61160f2556085a070dab104c4e997a8898b93f2c196eab50e287fefc65df6818f5206e676a6e295262e75856a7e7424057aa948ab
-
SSDEEP
1536:vmfu6a/dSkDVMKuJUYFOrV1Ys+b5e4Hh6K4sKTrQTG:vmG6a/dSkOKuJUYFOr/YdbwtsKTG
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Google Chrome
51.103.217.70:8585
Google Chrome
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
2204-8-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ