Behavioral task
behavioral1
Sample
f26750599580db6726f38fe6754245f01087e99003521f69342ca6ae7c06a818.exe
Resource
win7-20240221-en
General
-
Target
f26750599580db6726f38fe6754245f01087e99003521f69342ca6ae7c06a818
-
Size
45KB
-
MD5
4e547ac00a46ce5fec1c4138c027430a
-
SHA1
45134d953b15d6609f325fe5add1cead752f746b
-
SHA256
f26750599580db6726f38fe6754245f01087e99003521f69342ca6ae7c06a818
-
SHA512
e7222c1e211a638191f859c86c63507355654706b7d33fbe13c09662d102e3d206240611684af6e9b376ebad075033135e450a936cad57a068391514e5d71b4f
-
SSDEEP
768:mu/dRTUo0HQbWUnmjSmo2qMwKjPGaG6PIyzjbFgX3iRcRBqFXEd7P4PMeeBDZyx:mu/dRTUPE2kKTkDy3bCXSivG87APMHdw
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
8zuuUE1fgvEw
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f26750599580db6726f38fe6754245f01087e99003521f69342ca6ae7c06a818
Files
-
f26750599580db6726f38fe6754245f01087e99003521f69342ca6ae7c06a818.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ