Behavioral task
behavioral1
Sample
2336-7-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2336-7-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2336-7-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
733c9a82313256944b44402f9711db36
-
SHA1
b79c2de0ac2e4b14bc3975aee04298d6dc89418d
-
SHA256
f4c06d58be986789f55aa48c67376b26b8b198ae569c67fe8f1ff43c098b0d3a
-
SHA512
90df895ed6e295ade282c72c0258ec12e0fc9596ed147c2704bd7eeb6d804a58dde4f90e46abffd7cb05dfdbc59196109da1e11a1d8b0c1bcc85d720c1f017f2
-
SSDEEP
768:4q+s3pUtDILNCCa+DiptelDSN+iV08YbygeA+ADohOvEgK/JvZVc6KN:4q+AGtQOptKDs4zb1JRQOnkJvZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
donelpacino.ddns.net:5500
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
2336-7-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ