Behavioral task
behavioral1
Sample
4772-87-0x0000000007F60000-0x0000000007F90000-memory.exe
Resource
win7-20231129-en
General
-
Target
4772-87-0x0000000007F60000-0x0000000007F90000-memory.dmp
-
Size
192KB
-
MD5
a315cb4fa58909e05b3476a1dc99799d
-
SHA1
03115839d9bbce6c5be1da56e58e281fbdc86ec0
-
SHA256
1fffe2d877613e62672914112206990b1ec33f5afeb86cc3019802f179fbd40a
-
SHA512
8958fa32cb71010bee619347828b43341067d06fb6c8f493b85086169616941fae611c08343ae47689c1b6fda3499dba04317277a06a2888695f5630de798970
-
SSDEEP
3072:MnSTTT2dVpn2wJkyT2aMZ+oJLrCi6qIPu/i9bVK2cHwATY+WpW:lT2bd2wbT2RIqPf6XPSi9b4f
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6342313307:AAFKd4P2Qn-FrHlxYQr9imHCnOVc5Cl4eMI/sendMessage?chat_id=1059970907
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample asyncrat -
Asyncrat family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4772-87-0x0000000007F60000-0x0000000007F90000-memory.dmp
Files
-
4772-87-0x0000000007F60000-0x0000000007F90000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ