Behavioral task
behavioral1
Sample
869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.exe
Resource
win7-20231023-en
General
-
Target
869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.zip
-
Size
23KB
-
MD5
3ec63f401e739eb0411e7d35d987c98d
-
SHA1
0703806e85c5fad6c4978097e0e222567c21fe50
-
SHA256
78f43e7a76d172b4ffdb091f1f14e9d67600660624ec05752ee40074643dfe92
-
SHA512
0db11113bf18f8fa4986a6547524e02d917250f51562af51bba0684a86e47c6f680392f9d66a3bb72053ede3d0756cad00b739e441cd7e818d92147851989e35
-
SSDEEP
384:O34EP803rJhHHw+Ngo0maLGbXJc8GH160CvdP7LQAux1Hk2thnP9YeehO2YTl6:fSrnj8mCH0jLWx1Hk+P9ShpYTl6
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/SmAM5GKw
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.exe
Files
-
869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.zip.zip
Password: infected
-
869a8a2daa890b414c51af99be794e78d6bd3c60d1450b017e78d421428587c9.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ