Behavioral task
behavioral1
Sample
6c3e5106d3a3beebcae780dac855de2932c7df511ac3fb0fe0fe218f4fa7878a.exe
Resource
win7-20240221-en
General
-
Target
0cb55a1ed45681086c711afc153155d1458cca789ae867ee0a7c9b4917d77a18
-
Size
28KB
-
MD5
2b64776f9340aec8d53a627ef898c01e
-
SHA1
2f089428210e48d38d5e176d1e6d527957c73d17
-
SHA256
0cb55a1ed45681086c711afc153155d1458cca789ae867ee0a7c9b4917d77a18
-
SHA512
14a822464e4805fc47a2f64ce9ba4ce2e76d2cf0ee7f1eb1779fe25d358493f9dfb5ba926e5efa7fccae33b484197e9b6449af7b933cf568d368349435fbb1ce
-
SSDEEP
768:hob5I7ErlX2/QxlC4qKBJkawjQshQuPyFHHfLZHlwn:hpIhXpl3z8vJ0nzZHlwn
Malware Config
Extracted
asyncrat
AWS | 3Losh
EXDOUS
rootsaul.duckdns.org:8808
rootsaul.duckdns.org:6666
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/6c3e5106d3a3beebcae780dac855de2932c7df511ac3fb0fe0fe218f4fa7878a.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6c3e5106d3a3beebcae780dac855de2932c7df511ac3fb0fe0fe218f4fa7878a.exe
Files
-
0cb55a1ed45681086c711afc153155d1458cca789ae867ee0a7c9b4917d77a18.zip
Password: infected
-
6c3e5106d3a3beebcae780dac855de2932c7df511ac3fb0fe0fe218f4fa7878a.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ