Behavioral task
behavioral1
Sample
1742b48fad9814441ee7726009a0e375757134dcc872f88ed584b6a2099c7473.exe
Resource
win7-20231129-en
General
-
Target
19e6c35edf4a0d80e5317764b621bfac.bin
-
Size
28KB
-
MD5
786f550c3161e09fa406eae05b22dfac
-
SHA1
83afc7957b26831b83168d24dfeb673c195d5e89
-
SHA256
3fc2dae867790fd11c6465a5388effe5bb2d51a488f9595d9f19a516fe608107
-
SHA512
d3e8c6cb6a41561df2c316135da654431483af68a3fae3f470db7a6d24b1fea3f814e83f05d30ff0fedf74e799dccf2c3eb32134ab320820177cdb052ad7d01f
-
SSDEEP
768:mT3kgGZIdqLiLi3ySvDb6CR9shHnWdwII/kYvpVv:mT0gYaPKyHWo/kYvX
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
asegurarAsyncRAt.4cloud.click:8889
asegurarAsyncRAt.4cloud.click:1234
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/1742b48fad9814441ee7726009a0e375757134dcc872f88ed584b6a2099c7473.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1742b48fad9814441ee7726009a0e375757134dcc872f88ed584b6a2099c7473.exe
Files
-
19e6c35edf4a0d80e5317764b621bfac.bin.zip
Password: infected
-
1742b48fad9814441ee7726009a0e375757134dcc872f88ed584b6a2099c7473.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ