Behavioral task
behavioral1
Sample
2356-5-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2356-5-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
2356-5-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
66fed8e39e1548cd366b75cffefc59f0
-
SHA1
fd945c7dd8f37e61fe5e11734e7ef388693d5f55
-
SHA256
11feec3ee150afce154263b4b3ba450f799d781d86d7deb7952346e9e91529e3
-
SHA512
4046ac2da55f100086f8d03463f919f539d88e8308a94ab9043f8554f656ab4cdca43cf1a323e0a4bf65cc0c89043b4a0d2d80bbf685536e1f0be88386ef9e56
-
SSDEEP
1536:3u/dRTUPE2S75baPoKYlxGbCbwIMhxicFk9d:3u/DTUPE2o5baPoKOxGbCDoC
Malware Config
Extracted
asyncrat
0.5.8
OS
20.117.108.240:7825
IOr8QBoiV215
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2356-5-0x0000000000400000-0x0000000000412000-memory.dmp
Files
-
2356-5-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ