General
-
Target
0delay.exe
-
Size
47KB
-
MD5
5903cca54341f7014afdbb855b61c237
-
SHA1
1d5ce73e1bcdd1d4b79f43cd993756a5447d10dc
-
SHA256
e54709382641638cb33d50acf104dc036bc4d0dbcaacfd6ee914b4ceaaab9c2d
-
SHA512
3f4c5471f4f14d47554255616ede516d2a159838fc74c50d5114d8aacd96cc605ff02c9d2d895c718a2f3573a06fdbbe7cbaec39410eb64837e2f3e447821eee
-
SSDEEP
768:ABUQgNIL4+M0+LiZtelDSN+iV08YbygejfZWumXRMNQvEgK/J/ZVc6KN:AB1gjsZtKDs4zb1OZWum++nkJ/ZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
tr2.localto.net:34996
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
google.exe
-
install_folder
%AppData%
Signatures
Files
-
0delay.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ