Behavioral task
behavioral1
Sample
c6b2f283b8d973c15c02fa53a81775d61317ac6e863eb2ccff430fddcc512eb1.exe
Resource
win7-20240705-en
General
-
Target
400e3c8a4af105bc3c9953b1d6d3c73629925f3b3f7b503617719be639f7e763
-
Size
22KB
-
MD5
7ba161efc169057fde228f7ca0a93b70
-
SHA1
694303f31bcfd75bbe1eafa007319d5bc430812b
-
SHA256
400e3c8a4af105bc3c9953b1d6d3c73629925f3b3f7b503617719be639f7e763
-
SHA512
49ffef34d208b1c6fb247d5a3c995cf73a7a7a5d563f793245705312b6e1c076c1056843b3ec314259678e149f689a6467e9ef78cdec9df2e500aa8bedb6bf2f
-
SSDEEP
384:wOUvqR71Wwft+HXI0JAAxkvTDOoYKVQyb0MIXfkUG+UuhhKjyqjTVK3D9JGb77:vRBWwK9k3xQpMIPkUGluz1qjZKT9JGbv
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
mPoTo6VzKRgc
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/c6b2f283b8d973c15c02fa53a81775d61317ac6e863eb2ccff430fddcc512eb1.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c6b2f283b8d973c15c02fa53a81775d61317ac6e863eb2ccff430fddcc512eb1.exe
Files
-
400e3c8a4af105bc3c9953b1d6d3c73629925f3b3f7b503617719be639f7e763.zip
Password: infected
-
c6b2f283b8d973c15c02fa53a81775d61317ac6e863eb2ccff430fddcc512eb1.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ