Behavioral task
behavioral1
Sample
b3d417b15e1f00fceee54400f8616f83e74e3f143ea885962ae380802c637841.exe
Resource
win7-20240221-en
General
-
Target
ff4e090050d2ecfe31965422df013204c660f3a2fa8cd0cb0c0441258418b7a9
-
Size
35KB
-
MD5
e8fff767815327a0dd23ff9bce1f1e57
-
SHA1
fc83b63487a7c62dbcdf17b85b29688c65293ae7
-
SHA256
ff4e090050d2ecfe31965422df013204c660f3a2fa8cd0cb0c0441258418b7a9
-
SHA512
f2a2aebf006c5433ef0d1aff32fc4f2eb7e40fdb5086a03a426e75238eac698846119e31144950889db8f73dfad40203a7a94f4a97f28c6c76fa776c302fcd65
-
SSDEEP
768:PEO9smn2ugA0QPkZAioVH5DblsoIf5yOjSPFbm8t6TBrqsgj6gXLQsCE:PEO9jaQPAwVZDbCoo58dmr5qshFE
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
shsajngnif
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/L6fX3GgP
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/b3d417b15e1f00fceee54400f8616f83e74e3f143ea885962ae380802c637841.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b3d417b15e1f00fceee54400f8616f83e74e3f143ea885962ae380802c637841.exe
Files
-
ff4e090050d2ecfe31965422df013204c660f3a2fa8cd0cb0c0441258418b7a9.zip
Password: infected
-
b3d417b15e1f00fceee54400f8616f83e74e3f143ea885962ae380802c637841.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ