Behavioral task
behavioral1
Sample
3967608368d8e5ff9ce5a8fed7baedfa7e4331a8bfd4a7c3337c825e4b22e972.exe
Resource
win7-20230831-en
General
-
Target
59072d9cedb999a81634e7263885ced5.bin
-
Size
76KB
-
MD5
117bb80589fcd4398063487318f935db
-
SHA1
bdce36fedfbc50f0dfea7aca5572df1e020110fc
-
SHA256
7bbaa76d67a07143bfdcd872fdac95dd19e43ce9ecceccc767a43f4224353068
-
SHA512
da156d52093af35744b19832c7e8cf6d2e66b6d42e31ceae523eae84d3bdc8c135a2027a12de0da494d7c1aff51cc52dc82908bf432c2a61ca2771105e636c4a
-
SSDEEP
1536:DGMTfLusTgUtrXwQPM4Q6L5PcThlbZGNMrEsh8bXBwm9NlLbOd7:KMTznbNxPdQOm9gsxSam9L3Od7
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
oijhbfdsfusovipjfgnkjr
-
delay
60
-
install
true
-
install_file
ChromeUpdater.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/iDdcNn8h
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/3967608368d8e5ff9ce5a8fed7baedfa7e4331a8bfd4a7c3337c825e4b22e972.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3967608368d8e5ff9ce5a8fed7baedfa7e4331a8bfd4a7c3337c825e4b22e972.exe
Files
-
59072d9cedb999a81634e7263885ced5.bin.zip
Password: infected
-
3967608368d8e5ff9ce5a8fed7baedfa7e4331a8bfd4a7c3337c825e4b22e972.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ