Behavioral task
behavioral1
Sample
f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe
Resource
win7-20231215-en
General
-
Target
ed874247ba34366a5aa9be89c9cc1baf.bin
-
Size
23KB
-
MD5
42454be1e10faa658b2a5e2e848fadd7
-
SHA1
8695ef351e1fcd158ffd21dc6f785322fe4cf24a
-
SHA256
fc59b39a7ecf1372a1d89dd5fa317d0ae1174ff07b11a33fec7069c70e9a0fa9
-
SHA512
466eaac940b199ea87492a8f48b1f8635e98d5a1b04dc5443539a40ea7860cc096328879953959fe609503e2153dc3af20ffd509b5add619b50bb688f28c1462
-
SSDEEP
384:8APmFwYRL9qT1axDkLOrsNtzvenBRlwiD2m2r6U0ivcH4F4vii5Tuuk/vD88BCoV:80mFPxDErNtaB7SmC6RvD5G/vD88Bd
Malware Config
Extracted
asyncrat
1.0.7
Default
20.217.81.50:8080
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe
Files
-
ed874247ba34366a5aa9be89c9cc1baf.bin.zip
Password: infected
-
f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ