Behavioral task
behavioral1
Sample
BL109533.exe
Resource
win7-20240221-en
General
-
Target
0e9843ac44d44e81b5baae5c100464c9ad0a36d8e02cfb3e5e9165d07d70af20.tar
-
Size
46KB
-
MD5
0eb889c47388d45dca747b4ee2c67eda
-
SHA1
28d805ca3315727aca2b2cf0e4f6cc97d9b7c6ce
-
SHA256
0e9843ac44d44e81b5baae5c100464c9ad0a36d8e02cfb3e5e9165d07d70af20
-
SHA512
c59bd332313d2fb9a36d199a37f124843555d0c8c8097f81a30aef8ce053bedef1fbdbba7a8188056c778710a2824ba941af9aa9a94085404e3fc5d5922e2a0e
-
SSDEEP
768:YufxhTXbDdbWUn7yqmo2qRoKjPGaG6PIyzjbFgX3iZBK+Crr0BbOLBDZ6x:YufxhTXnN2vKTkDy3bCXSfK+00ZOdd6x
Malware Config
Extracted
asyncrat
0.5.8
Default
64.176.178.205:1989
6SIAFnLdui5N
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/BL109533.exe family_asyncrat -
Asyncrat family
-
Detects file containing reversed ASEP Autorun registry keys 2 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse static1/unpack001/BL109533.exe INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/BL109533.exe
Files
-
0e9843ac44d44e81b5baae5c100464c9ad0a36d8e02cfb3e5e9165d07d70af20.tar.tar
-
BL109533.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ