Behavioral task
behavioral1
Sample
14c66a0b3a199d38a236bed7780258d84c8a3cf335f9397769dc06a17d5707e0.exe
Resource
win7-20240221-en
General
-
Target
aa603e3b55b1c895bd213d06fcbced27.bin
-
Size
32KB
-
MD5
2bd9422d84e0b67a68e5e8bda80b2656
-
SHA1
040325a88668735ae984b84df5e274923292bf99
-
SHA256
9ac0902f5cc08e7b1fd92bced41318e497a374e3be972a6d78700bc6d03a277b
-
SHA512
532943f81619a52768335f1f7fda01531a335a618912109744ee6d619b1c1c8192138bf3ed93b87bb9ef0eb4050e374792bcd54a94b151a0b7cd0aeec6c7319d
-
SSDEEP
768:D3kBk8+sMw9SN3zSUTizco4j2+WI7W0ABTjb+:Iu8+hN3zSUTm4jPgBq
Malware Config
Extracted
asyncrat
| nelsontriana980
Bypass
bypass-asyn.4cloud.click:8887
AsyncMutex_654I8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/14c66a0b3a199d38a236bed7780258d84c8a3cf335f9397769dc06a17d5707e0.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/14c66a0b3a199d38a236bed7780258d84c8a3cf335f9397769dc06a17d5707e0.exe
Files
-
aa603e3b55b1c895bd213d06fcbced27.bin.zip
Password: infected
-
14c66a0b3a199d38a236bed7780258d84c8a3cf335f9397769dc06a17d5707e0.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ