Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
AsyncClient.exe
Resource
win10v2004-20240611-en
General
-
Target
AsyncClient.exe
-
Size
63KB
-
MD5
ff9f6687cc444bafed3629b1cea084cd
-
SHA1
13f08c1a120fccc0d77964eb28d5e16517ab7fb8
-
SHA256
db49b80f26a8a7ab86d883859e7770fa0486fed0abed500af237213706c7f21f
-
SHA512
78a47442fe538465fb3f4ecb51d573dca90ba732c9048f854b0128f97305976e4b0498194841e721e0f096e2449cf05ce937fa0076f4f8726ac680123ecc00b1
-
SSDEEP
1536:92c63SfiQk6gcKu/UYFLGXw5bfAPft9C3rQTGhx:92cmSfiQkOKu/UYFLGXw5bfgw3Gax
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
SolaraFake
anyone-blogging.gl.at.ply.gg:22284
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Signatures
Files
-
AsyncClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ