Behavioral task
behavioral1
Sample
db4ded7e203382cf90c69455577a23e0526a1b86b95675e59d7ede2362cce2c8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
db4ded7e203382cf90c69455577a23e0526a1b86b95675e59d7ede2362cce2c8.exe
Resource
win10v2004-20240508-en
General
-
Target
cfa3c233dbdff5cf57692484c4e50e6a.bin
-
Size
28KB
-
MD5
9acc2cd293a345acfac4979054ff529f
-
SHA1
5c2ef69c050f24d9fa5bcd0696a6fc138f6aed64
-
SHA256
4cd88a5b9f15e3b23845914df4c42655899bfc18eb1fbb9974f513d2fd1195d3
-
SHA512
93521c8c01cb59854acf27ea5f6173db0dc058c56ae62868ad1fbed0bfa41751daf4aaf637a3ddeb03e30ef1302149927a76e6e928c25f554c92ef814ad20ca7
-
SSDEEP
768:wwDWGc64Is4490ztYDltK4u64XBc8966IdYlhdiDS:JWGFSp9jD9uNO+lh8S
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
27 27 27 27
wins26junspam.duckdns.org:9003
AsyncMutex_6SIkaPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/db4ded7e203382cf90c69455577a23e0526a1b86b95675e59d7ede2362cce2c8.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/db4ded7e203382cf90c69455577a23e0526a1b86b95675e59d7ede2362cce2c8.exe
Files
-
cfa3c233dbdff5cf57692484c4e50e6a.bin.zip
Password: infected
-
db4ded7e203382cf90c69455577a23e0526a1b86b95675e59d7ede2362cce2c8.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ