Behavioral task
behavioral1
Sample
malware.exe
Resource
win10v2004-20231201-es
General
-
Target
malware.exe
-
Size
47KB
-
MD5
3b62a68f6b7f0c41404ce2c3a4a07f96
-
SHA1
2a93f3ec09337370a9829dff8a6db5e693c0974f
-
SHA256
876a3c469449dbd633ea8f8ae23d07f52227063a7fed2419d180e8390c227084
-
SHA512
c954900cd885a4f2ab5353f88b744430c2f57513179f6400471840e7586fb312f3d93140774c0b15361bff0bf291458ca3f93c43ea1a5da5a882ee561a01eb7f
-
SSDEEP
768:d6T3ILNCKi+Din0Ni5Q8Yb6ge0s4Pl/ZgvEgK/J9lZVc6KN:d6YmnUzbtOGFZgnkJ3ZVclN
Malware Config
Extracted
asyncrat
1.0.7
****30****
wins23octok.duckdns.org:8004
tskjaskdfsajhs
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
malware.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ