Behavioral task
behavioral1
Sample
Siski.exe
Resource
win10v2004-20231222-en
General
-
Target
Siski malware.zip
-
Size
23KB
-
MD5
acb1f5986b16ee9527e3df11f1fdc13e
-
SHA1
91a29981e09b8f45a33180884f9ecfea314a8fb0
-
SHA256
632e0acde5ce4396687aa3dc3790eba74ee68d1888d187c67e958dc64e07e119
-
SHA512
c413bfb37b8feb740ed53bcc23dce9645b491c50e6e86579847b23e21d75aaf88e86752f13b9c13e4f37a16bf50a827ab25e79277ee01ccc3a832501785d260b
-
SSDEEP
384:yAlojh3/96drjnr15kh1EzNeRJdfBuZ4mdVwZ7KB9YF9JkpirViz6xuRN/AyRAQ8:yAlo93lMroh1J04mDm7KvYF9upirVMjS
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
109.120.188.95:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Siski malware.zip.zip
Password: infected
-
Siski.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ