Behavioral task
behavioral1
Sample
06417db53e9b090c7a07192dbb6203ce15c832c0928d73ebbc9c8ebff05320ff.exe
Resource
win7-20240221-en
General
-
Target
0b345b247f56c4cdf9d25bd322370debe8203dd610378f9b9564bd1cd803f0b4
-
Size
22KB
-
MD5
2acd15c53f8daf37215211377a244fbd
-
SHA1
ccd901febd682df6964436c710ba97f4f55e4143
-
SHA256
0b345b247f56c4cdf9d25bd322370debe8203dd610378f9b9564bd1cd803f0b4
-
SHA512
83c93c7f28000b1307a4e7ebd845fb11ea63a08f52e4e0bd31a93685f4f696bea85ebfa21df20ccf60b795b84ca039c179a09bb369924cc07df8822260b8047b
-
SSDEEP
384:xUTNO9IJq0surV30lxpyuFuuKAGNxc2Yi7NwXsWYRP6On8zNqpnDyXE:WBsuJ81GNx3yX3YRjENODf
Malware Config
Extracted
asyncrat
0.5.7B
Default
193.32.232.64:7777
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
aha.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/06417db53e9b090c7a07192dbb6203ce15c832c0928d73ebbc9c8ebff05320ff family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/06417db53e9b090c7a07192dbb6203ce15c832c0928d73ebbc9c8ebff05320ff
Files
-
0b345b247f56c4cdf9d25bd322370debe8203dd610378f9b9564bd1cd803f0b4.zip
Password: infected
-
06417db53e9b090c7a07192dbb6203ce15c832c0928d73ebbc9c8ebff05320ff.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ