Behavioral task
behavioral1
Sample
bQoY.exe
Resource
win7-20230831-en
General
-
Target
bQoY.exe
-
Size
47KB
-
MD5
47f036f9996df7d9d5809b698fd41f75
-
SHA1
de5a3ddd6f1fe193e5b4479a1be4f3c3c3f9ca8f
-
SHA256
6c5fd2c3ea7ab79e05f224db020cb5dac63b3aa2a81f691753c7020e0c6159f2
-
SHA512
113b79eac478bdaeaf54951ad8381ef746c6bf632b927d24a0483362774363c2f5a0aa291bc8da1eeb18827cb986cc4dde48acd7c148f23010a8592b83fcb8ee
-
SSDEEP
768:gq+s3pUtDILNCCa+Di9q+WisE8YbBgeQgwvEgK/JHZVc6KN:gq+AGtQO9q+zbu3ZnkJHZVclN
Malware Config
Extracted
asyncrat
1.0.7
Pjoa10
4Mekey.myftp.biz:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
bQoY.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ