Static task
static1
General
-
Target
AsyncRAT.exe
-
Size
6.1MB
-
MD5
2e22d85e49e70fdcb2b516fc2431ed52
-
SHA1
dd3384e996b35c7a4f97696246b12d11d400f595
-
SHA256
9588fa3988ffa70c288f0566fffe1e219c0936d5af6dce5ec8b9e1b5161331bc
-
SHA512
27a81170f25e5f2bb2222669e00b9fc267a15b7b2a51143cec7d4af1475bed145fedeede038d82bf2d7bc197e8caba2a54ebeca741ed3d7d7d231f1c4374d6ae
-
SSDEEP
196608:mxeAwpZllbJwIwOA3x/6txY0h1L4EB3zDG1w:nZllnwXcth1kWjOw
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource AsyncRAT.exe
Files
-
AsyncRAT.exe.exe windows:4 windows x86 arch:x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 6.1MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ