Behavioral task
behavioral1
Sample
3ae8d263abd33819980c81f1e0b6b876f06e5747807459e82a47fd518767358e.exe
Resource
win7-20240215-en
General
-
Target
87035d522d260a5712d51f52d4276d9b7e2ca173078131bbbd84f5ce801853d9
-
Size
34KB
-
MD5
5d605a88039ecb4095d0187423535bd9
-
SHA1
8ab2ea9309a969060ed27af5bd1873910ccc1b7d
-
SHA256
87035d522d260a5712d51f52d4276d9b7e2ca173078131bbbd84f5ce801853d9
-
SHA512
efce449c52aa6dcb0f951e7d5ce2d9fae0b1412b29f307fd6acc37d158e0e25de48c948b36069726e78239a87387b5146e335a5cbdac5d678233377b7de65ccf
-
SSDEEP
768:pVo3c0FDE04lpS3U2W1uy8aLO03TAVQBOFsnFExVwdPfFEKdz7HgNEt:T8cMDE04rSU2AuydLd3TKQwFBxVwZh9r
Malware Config
Extracted
asyncrat
0.5.8
Default
mznhr.ddns.net:4887
nNOjwMCRy3Bl
-
delay
3
-
install
false
-
install_file
puttysock.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/3ae8d263abd33819980c81f1e0b6b876f06e5747807459e82a47fd518767358e.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3ae8d263abd33819980c81f1e0b6b876f06e5747807459e82a47fd518767358e.exe
Files
-
87035d522d260a5712d51f52d4276d9b7e2ca173078131bbbd84f5ce801853d9.zip
Password: infected
-
3ae8d263abd33819980c81f1e0b6b876f06e5747807459e82a47fd518767358e.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ