Behavioral task
behavioral1
Sample
ffe2d2e6b930f0b8f752d2a478d77cfbf9467006d294474fe33970a8c529b75a.exe
Resource
win7-20240729-en
General
-
Target
5f00c912f2ac12df8525a30afb8f776e.bin
-
Size
30KB
-
MD5
53f3006de4d699f17309edfdff009c78
-
SHA1
4685b765f94561052bd3202b150fd5816fc608e6
-
SHA256
83c854b5ab60971d9d00fe88f9ec5238087b27ac2a7606e34d249778d430b445
-
SHA512
b266b5d5b20a926f0288ee5fa2176cf832fe9681ac3a1524a67ae31b8fdd1e6a76d90a5fcfe5c7c85d6e6d7c1cae74ed0d2cf58c7dbc078bf1eea9ce077b0cbc
-
SSDEEP
768:uvVFilMJmgOPQHS5GrZ+IsltoyUxIzJ/eKgY9XojjX5y2qeYH:OilMkfqS5Grg1UWzFkjp+
Malware Config
Extracted
asyncrat
1.2
Default
stores-less.gl.at.ply.gg:45080
AtomRatMutex_penka
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/ffe2d2e6b930f0b8f752d2a478d77cfbf9467006d294474fe33970a8c529b75a.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ffe2d2e6b930f0b8f752d2a478d77cfbf9467006d294474fe33970a8c529b75a.exe
Files
-
5f00c912f2ac12df8525a30afb8f776e.bin.zip
Password: infected
-
ffe2d2e6b930f0b8f752d2a478d77cfbf9467006d294474fe33970a8c529b75a.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ