Behavioral task
behavioral1
Sample
3640-167-0x000001519FD30000-0x000001519FD42000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3640-167-0x000001519FD30000-0x000001519FD42000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
3640-167-0x000001519FD30000-0x000001519FD42000-memory.dmp
-
Size
72KB
-
MD5
4391e3cb9464f015722a26b1426423bd
-
SHA1
297777ebc65447e670445d7231cc87eb294b4282
-
SHA256
72a1fbab5749d564192be2f1d5ab8916861586b19a36a038ef3aebf26070d763
-
SHA512
079b6d0956adf7fe80fdb513c75e5f1d2698b4e94aa8c30a2ecfdc8d3bf3c67925d530a2d2a000a37641a135ed885ce68b49900f9884eb12e6758b175c6d4dda
-
SSDEEP
768:dOEuILWCKi+DiBtelDSN+iV08YbygeTnmeuPBivEgK/J9lZVc6KN:dOtmBtKDs4zb1Snmeu5inkJ3ZVclN
Malware Config
Extracted
asyncrat
1.0.7
scrubloader
scrubloader.ru:2192
DcRatMutex_qwqdanchuncd
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
3640-167-0x000001519FD30000-0x000001519FD42000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ