Behavioral task
behavioral1
Sample
2d3770870c1b3116a047d960707cbf07de97957908ec82ca6e3b6519ca1ede85.exe
Resource
win7-20231020-en
General
-
Target
6245024bd7965b1bb284f757884f12bb.bin
-
Size
35KB
-
MD5
d439a9fbd129326c700bdba350136889
-
SHA1
8369dcc16d87644467e42c3fd7569e0809c0728d
-
SHA256
a34fd585d26a648d7b2a7ab5b0aa70e36587b88beeab21bff0fe1360ec1b7383
-
SHA512
5df73de0757d44dc72a8c644d6c834cd67c020bf3f88f60b943f5f9f9094802b047ef6d878198d85982c6376a391fcf82c204202d6a0c8abaa2afc4ff61da086
-
SSDEEP
768:GxJdcJhYraTY0ADSAQQKzm6H6p+EtWiXFuBkUomxefqlQWfiWy1GYZ:Gx7crFTuDXQQKzN6pXXA2C0ylQWf68c
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Wifi
prfqgcbkhfyyvkp
-
delay
1
-
install
true
-
install_file
System32.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/x5dAqXRm
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/2d3770870c1b3116a047d960707cbf07de97957908ec82ca6e3b6519ca1ede85.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2d3770870c1b3116a047d960707cbf07de97957908ec82ca6e3b6519ca1ede85.exe
Files
-
6245024bd7965b1bb284f757884f12bb.bin.zip
Password: infected
-
2d3770870c1b3116a047d960707cbf07de97957908ec82ca6e3b6519ca1ede85.exe.exe windows:4 windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ