Behavioral task
behavioral1
Sample
64f373211953aa5e294e9d7dee8dee07866ceb7fa944f8c5845792489433afb6.exe
Resource
win7-20240215-en
General
-
Target
86cab8d49fd38362415c87b644d4ddab.bin
-
Size
28KB
-
MD5
59dfbbbdab4c73a86b7240d7148859f5
-
SHA1
5b01f0f6cf1b1897573ab146fdc34334ef3c1be6
-
SHA256
06b4302ff043da55466dd9dc6f656e0486ccd6b14fb11b62ba0fa6c9c837c285
-
SHA512
d3d09769e74e54001780de96a8110b1444aebc2ece0b1437a13b6606e2e4b1e2c1fd5146fb4c7e143c1d4c48166fe2a9d7f451f9a9c744df258f5bef222a2aad
-
SSDEEP
768:kFV/NyguPmr+RTD8QBA63UM6Bv0WW6a1/PtwWHR:9gHr+dNbtWWvt7x
Malware Config
Extracted
asyncrat
AsyncRAT
RbxFps
eve.now-dns.net:313
AsyncMutex_raw
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/64f373211953aa5e294e9d7dee8dee07866ceb7fa944f8c5845792489433afb6.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/64f373211953aa5e294e9d7dee8dee07866ceb7fa944f8c5845792489433afb6.exe
Files
-
86cab8d49fd38362415c87b644d4ddab.bin.zip
Password: infected
-
64f373211953aa5e294e9d7dee8dee07866ceb7fa944f8c5845792489433afb6.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ