Behavioral task
behavioral1
Sample
a8fcd268b48c903e21500439d6754500d59d12d7d5d4e2c7ea737661fa8fe230.exe
Resource
win7-20240705-en
General
-
Target
fedb1274930bfa08a83480134a3f1412.bin
-
Size
23KB
-
MD5
385e8bd3d7897dfcf21b7ead020a8aed
-
SHA1
0cfbe041ee60ef9c4887ec5b4e3940f97d6f5798
-
SHA256
583cc3af9243cfb86774b4c31e4c7e4d1202fc467092d18830c66a44e8df6301
-
SHA512
7d3450d25945a2656ab8fb418b76b1d9317f51fff6ef01ec52bd97cce3026d38bdfd170c7e963183ea09a097a5ccc688de248a85d72525889be5632d846002d4
-
SSDEEP
384:pmxwxCRbYSXCHPThm+OLWO2FUZjCvXkawgvSVyKnjfz6dqWavUb9G2BYxM:4n5YSXCHPFmzLWZe0Xka11KnjL6QhaGE
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:1024
20.199.84.103:1024
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/a8fcd268b48c903e21500439d6754500d59d12d7d5d4e2c7ea737661fa8fe230.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a8fcd268b48c903e21500439d6754500d59d12d7d5d4e2c7ea737661fa8fe230.exe
Files
-
fedb1274930bfa08a83480134a3f1412.bin.zip
Password: infected
-
a8fcd268b48c903e21500439d6754500d59d12d7d5d4e2c7ea737661fa8fe230.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ