General
-
Target
1_asyncRAT.exe
-
Size
74KB
-
MD5
cd1d9d8c7fbbb206c654556afde03ab3
-
SHA1
788a75adb021352a7b4f4c79cf5ea2a8e96890a7
-
SHA256
590ce0f0db71cbb18caa2cbda6c7ef31235b72f5965da3c8caf7fbe736466fc1
-
SHA512
1bfbd2324975516118ce4524aa405ca3682883979c0967a55b399c75d4683fd3e4edb8b8fbb5f51be5a6b425e29c4f1f29244e73c0fbe073c1a26117ca4354f5
-
SSDEEP
1536:BuwqNToqad2Fh+e+bcc9XhbTFhrMa/GFMd8eZ5/EAH5fW:BuwuToVd2Fke+bLXhbTxOOGoltHRW
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:4431
24.167.114.213:6606
24.167.114.213:7707
24.167.114.213:8808
24.167.114.213:4431
9p9pqYkXQoDU
-
delay
3
-
install
true
-
install_file
dictator.exe
-
install_folder
%AppData%
Signatures
Files
-
1_asyncRAT.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ