Behavioral task
behavioral1
Sample
fa5ad278a5180b1d70fbedc48695aee9b1cf9a9035f2f7176c19a5f043057eb4.exe
Resource
win7-20240704-en
General
-
Target
83dba581c05c7319ce2fca0cabcdd413169a71c40c66a0853ab0db2ffcdffb72
-
Size
25KB
-
MD5
e086df23020a9da3d8d6f2e1ef2dba41
-
SHA1
6827a3b76c4a9220b8c7efeeddbd83add5239954
-
SHA256
83dba581c05c7319ce2fca0cabcdd413169a71c40c66a0853ab0db2ffcdffb72
-
SHA512
ccb08257986264c1f0fe639de64b4cb6bda74bb81c6cee533bf73b2db7808fdccd09e79aaf52d4708c7a7e321d1030e749e22ee8cb42b5288632005ab2cfb730
-
SSDEEP
768:0sO2Sqvn/sMOrNHvkiRsydY/Kb18bslPW5/VDvXlsQFa1ESL68:0sO5GBO5PkiRsyGS10qu5/JdW1re8
Malware Config
Extracted
asyncrat
0.5.8
Default
act-kick.gl.at.ply.gg:58631
FZ1mENmMubo7
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/fa5ad278a5180b1d70fbedc48695aee9b1cf9a9035f2f7176c19a5f043057eb4.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fa5ad278a5180b1d70fbedc48695aee9b1cf9a9035f2f7176c19a5f043057eb4.exe
Files
-
83dba581c05c7319ce2fca0cabcdd413169a71c40c66a0853ab0db2ffcdffb72.zip
Password: infected
-
fa5ad278a5180b1d70fbedc48695aee9b1cf9a9035f2f7176c19a5f043057eb4.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ