Behavioral task
behavioral1
Sample
b923ff30fd180012590e759a6c012dd9a54266c021c1698cbe6e795a27ccc4de.exe
Resource
win7-20231023-en
General
-
Target
b923ff30fd180012590e759a6c012dd9a54266c021c1698cbe6e795a27ccc4de.zip
-
Size
40KB
-
MD5
4c8e87d578ea30f7e00080f85c06f18b
-
SHA1
5ff4b40639107488be33efcfd0c1b7b35e0fca45
-
SHA256
7da3d7be09450ec0a8cf24f8c2ace456c7ec72511ba2a470b11b6dac3b193ad8
-
SHA512
c0d2dbe92c57d871c9576d12605ccd6da14ae736e05131531e7a759d136d40140756d63e407a96888568492c67c706847ebab7d71caab43474f634f6d3cd8bd9
-
SSDEEP
768:UAxbIWjo21dvANkCimDQ3H6TRR9rmr4qunBKwgS9aes0U+96iORxAFKIiDpeO4+:fxb91+NHXkUrmr415V6iOkF8Fz7
Malware Config
Extracted
asyncrat
0.5.8
Default
5.tcp.eu.ngrok.io:16384
wL7U4T2m4PLm
-
delay
3
-
install
true
-
install_file
wolf team 1.6.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/b923ff30fd180012590e759a6c012dd9a54266c021c1698cbe6e795a27ccc4de.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b923ff30fd180012590e759a6c012dd9a54266c021c1698cbe6e795a27ccc4de.exe
Files
-
b923ff30fd180012590e759a6c012dd9a54266c021c1698cbe6e795a27ccc4de.zip.zip
Password: infected
-
b923ff30fd180012590e759a6c012dd9a54266c021c1698cbe6e795a27ccc4de.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ