Behavioral task
behavioral1
Sample
4080-1348-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4080-1348-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
4080-1348-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
da3f8ff65d8ec81de9ff65936078621d
-
SHA1
a4a697c8952cc42332eec5d6e68db876e8cc8d28
-
SHA256
bdc4a50564341059e643cb2b266378ebed8b75dd3da97439c21055dfe80eb2b5
-
SHA512
0f866b877747ada3e00a9c5dbc0c07d4f3356f908f682254d3e6b0eab4058ce297dea0aa38619fb68a6da4d9655df485caa4319040d4e273bebdb0471f8f8893
-
SSDEEP
1536:tuZrFT3nBL247z2HItCCj1db88PYupik3hEqdqT:tuZZT3nBL2oz2HItvjzb8uYGikSqQT
Malware Config
Extracted
asyncrat
0.5.7B
Winlogo
46.1.103.69:2341
Winlogo
-
delay
3
-
install
false
-
install_file
Winlogo
-
install_folder
%AppData%
Signatures
Files
-
4080-1348-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ