Behavioral task
behavioral1
Sample
f5a0c3bda27e711eb7ed0a8b67f7d6e8e668ea5b6f1c90d0ee3270c02dc345cc.exe
Resource
win7-20231020-en
General
-
Target
f5a0c3bda27e711eb7ed0a8b67f7d6e8e668ea5b6f1c90d0ee3270c02dc345cc.zip
-
Size
23KB
-
MD5
b36548d85c899454d08b34d1f906e177
-
SHA1
6214f5e867ad0ce5fe27d30ae47dfe6f4a163d35
-
SHA256
935120c271098e8f1f38327376d4622a359a27ecc21216df8b47102e75a5afcb
-
SHA512
2a247b48199e5d64d259a75e35bdb9d01bb9f26a1b548c47d463d8ba4c68c0ba355495c9caf77c306967dcce5f5d4f7ff5f238c14cf1efee91011721698bc000
-
SSDEEP
384:jkIYXSQp+G3eF0d/JvPXkX3DgKVpdKFsUwjFBcMzaqK0CrJyiGCX5gVvzSOr7wmM:Yjp+qK0dZPXOxHdAshcfqgrJjjX50tcf
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/SmAM5GKw
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/f5a0c3bda27e711eb7ed0a8b67f7d6e8e668ea5b6f1c90d0ee3270c02dc345cc.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f5a0c3bda27e711eb7ed0a8b67f7d6e8e668ea5b6f1c90d0ee3270c02dc345cc.exe
Files
-
f5a0c3bda27e711eb7ed0a8b67f7d6e8e668ea5b6f1c90d0ee3270c02dc345cc.zip.zip
Password: infected
-
f5a0c3bda27e711eb7ed0a8b67f7d6e8e668ea5b6f1c90d0ee3270c02dc345cc.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ