Behavioral task
behavioral1
Sample
b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe
Resource
win10v2004-20231215-en
General
-
Target
b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe
-
Size
20.7MB
-
MD5
ddab2fe165c9c02281780f38f04a614e
-
SHA1
2a5ad37e94037a4fc39ce7ba2d66ed8a424383e4
-
SHA256
b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e
-
SHA512
2ed2fae0cf40365710b237def0762c2afe5f7a7ee67d7a5ebcf2edf35e65dcfa761bf9a8557fa4fbe57f17a54043f700e7131fb170afdba37bc255d163f6b74f
-
SSDEEP
393216:STs66TCP+Zw6NLIsFfskh1BmXGN1Bd++ufV:Es66TCP+Zlnk0rmYBYF
Malware Config
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample asyncrat -
Asyncrat family
-
BoratRAT 1 IoCs
BoratRAT is an all-in-one malware toolkit that is capable of a variety of destructive activities, including acting as a ransomware, and performing credential theft.
resource yara_rule sample family_boratrat -
Boratrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe
Files
-
b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 20.3MB - Virtual size: 20.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.enigma1 Size: 120KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE