Behavioral task
behavioral1
Sample
b7c0f7b80c62db35dd345117351e8d872d698b13bb6f72a300a917d3e5680e6f.exe
Resource
win7-20231215-en
General
-
Target
473a35eb37019fce7d0023137712505b.bin
-
Size
30KB
-
MD5
9703b18a337ebf412623aa3246d1c8fe
-
SHA1
358aa7f25df899931906b37fd0e538edf6af8142
-
SHA256
40bea75403dc3402436b4282b0c7e8128455bd36506be48e18f6fa6900cd76bb
-
SHA512
d964d247aa1705f6ed051b713304e028517aa209f47ab064ba87d284ebc4abc658ee88cb87bf030c345f713658169a2e21c748d7ad75c5a2cdf1571d753128d2
-
SSDEEP
768:5wWVksCG1mDDWGEv37jW0GCtM65k/h7B/p9eN2Hsqyfe7AM13:5webCD5q3155kjp9Y2M5esc3
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/zbgUhKiW
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/b7c0f7b80c62db35dd345117351e8d872d698b13bb6f72a300a917d3e5680e6f.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b7c0f7b80c62db35dd345117351e8d872d698b13bb6f72a300a917d3e5680e6f.exe
Files
-
473a35eb37019fce7d0023137712505b.bin.zip
Password: infected
-
b7c0f7b80c62db35dd345117351e8d872d698b13bb6f72a300a917d3e5680e6f.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ