Behavioral task
behavioral1
Sample
f9940775e7025bd18f6fad8f2447348b68a9dea72995653586bda01a4eb14750.exe
Resource
win7-20240221-en
General
-
Target
d720e8c03d3d9f03e3aa671852169029b3670371b68518e91722ad0aa7eacc95
-
Size
32KB
-
MD5
b0a8603e39da6cbbadbc75714d097cce
-
SHA1
450a5377a7e5f4c51e8d98cd2ff69a9ce65c9a17
-
SHA256
d720e8c03d3d9f03e3aa671852169029b3670371b68518e91722ad0aa7eacc95
-
SHA512
e60ea014268c61e91ead7a717fef974a76839a5fbf45d3ee2a654fd575760ec0e376d182fe1f3df7ea24876f418a7c062ab8298de37487cc771f89342ff28702
-
SSDEEP
768:Fa+05FcHRvsz26GedFx5K7MsRyFl+/cKONqopu1:EMsz8edFH6MYyF8/3OK
Malware Config
Extracted
asyncrat
| nelsontriana980
Default
firmes777.duckdns.org:3080
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/f9940775e7025bd18f6fad8f2447348b68a9dea72995653586bda01a4eb14750.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f9940775e7025bd18f6fad8f2447348b68a9dea72995653586bda01a4eb14750.exe
Files
-
d720e8c03d3d9f03e3aa671852169029b3670371b68518e91722ad0aa7eacc95.zip
Password: infected
-
f9940775e7025bd18f6fad8f2447348b68a9dea72995653586bda01a4eb14750.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ