Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230831-en
General
-
Target
svchost.exe
-
Size
47KB
-
MD5
be2038d5a988cbcd52acaa236106000e
-
SHA1
b10e2f893ba0560f2fc75438b3492728f86cf290
-
SHA256
870e703602d197b4d1334f18d8ed752eaee792c3b762e110a0e3faee599817b5
-
SHA512
591c88f375be8554a498e6b3e2961b2cd7f2562eb73a9e8c1974833806997fc52457ee2758ad0619196fe80248e07bb5353da6756a13cbfcf57396c0b8743399
-
SSDEEP
768:oNc/qaIL0WwQ+jiPJsKU89yI//ica8YbhgeMwshJtvEgK/JvZVc6KN:oNciuYRrTopzbO1nkJvZVclN
Malware Config
Extracted
asyncrat
1.0.7
Discord
tr2.localto.net:43268
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
svchosts.exe
-
install_folder
%AppData%
Signatures
Files
-
svchost.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ