Behavioral task
behavioral1
Sample
d6ac33bdde804937341f6ac88e9f03c5738df8037df6184b2c14e848e6222a98.exe
Resource
win7-20240704-en
General
-
Target
d6ac33bdde804937341f6ac88e9f03c5738df8037df6184b2c14e848e6222a98
-
Size
74KB
-
MD5
aa89ed1bd7a09a03da6bef9ae0143509
-
SHA1
35a6f79a5ed45ad4b6682daca1b77b6355b9c6f9
-
SHA256
d6ac33bdde804937341f6ac88e9f03c5738df8037df6184b2c14e848e6222a98
-
SHA512
1e610419ded5dc49711d80feda97b7d2ff7fb71805acfaec004f8bfa4942130af869b17b1e8a3db121338588aa1d0f6a69d302d0661bdd0c20d9553e80e878f3
-
SSDEEP
1536:CUlkcx9pXCTyPMVt53pIZlOH1bW/Wab0XWQQzciLVclN:CU+cx958yPMVHslOH1bWp8PQzBY
Malware Config
Extracted
asyncrat
Default
15.229.43.98:7771
piikvzefolbyasuv
-
delay
1
-
install
true
-
install_file
digital.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Processes:
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d6ac33bdde804937341f6ac88e9f03c5738df8037df6184b2c14e848e6222a98
Files
-
d6ac33bdde804937341f6ac88e9f03c5738df8037df6184b2c14e848e6222a98.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ