Behavioral task
behavioral1
Sample
5924-662-0x0000000000E80000-0x0000000000E92000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5924-662-0x0000000000E80000-0x0000000000E92000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
5924-662-0x0000000000E80000-0x0000000000E92000-memory.dmp
-
Size
72KB
-
MD5
5d1cbd3646efa1e8bc17c8377cf4191d
-
SHA1
ed7eb5a0c732ac23936f77c26c1a8974975863a5
-
SHA256
e3d7b7abe5f7e62651edf9cd89ba03f1a1246a8f4a8531f32fd8f23e957a1a33
-
SHA512
180bf5ec436b3dabf4d18faaa18f58dcb611d30808881b5cf9d2566ed5fc3efc74c5b82a2fba96bda98e84509f1b011794a268510f6e33b1bedc9298059b6394
-
SSDEEP
768:+CT3ILNCKi+DiPNIU81l/4iU08YbEge7SxDGScavEgK/JrZVc6KN:+CYmlIT9zbL7xvHnkJrZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:1604
185.169.180.209:1604
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
5924-662-0x0000000000E80000-0x0000000000E92000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ