Behavioral task
behavioral1
Sample
edc777668f9ce5ff6214e2a6cbbef3a0N.exe
Resource
win7-20240708-en
General
-
Target
edc777668f9ce5ff6214e2a6cbbef3a0N.exe
-
Size
48KB
-
MD5
edc777668f9ce5ff6214e2a6cbbef3a0
-
SHA1
5f61bc93c7c32c8c800be8a3c35e8459ca3c7c48
-
SHA256
82b3763c958a8b5b12a9b37644839f9298e3cc620e5c4f52aed530f10e8c0c10
-
SHA512
369d248038a8b6b0abbe4e8b88d2aea6e79232c07adfa6cffa0a384e5b2e789cb330e1446a9840373791628c4beaf52be67ab2f2a1115071f6b2d372768ebaed
-
SSDEEP
768:losixILh4TD+ZioPSPNUiCj8YbFgeiS9EyzBx6HvEgK/JQZVc6KN:lo7douqzbCHS9HcnkJQZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
192.168.0.106:80
192.168.0.106:25868
192.168.0.106:60446
192.168.0.106:204
koeilz-25868.portmap.host:80
koeilz-25868.portmap.host:25868
koeilz-25868.portmap.host:60446
koeilz-25868.portmap.host:204
nikbobra-60446.portmap.host:60446:80
nikbobra-60446.portmap.host:60446:25868
nikbobra-60446.portmap.host:60446:60446
nikbobra-60446.portmap.host:60446:204
26.119.255.204:80
26.119.255.204:25868
26.119.255.204:60446
26.119.255.204:204
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
piska.exe
-
install_folder
%AppData%
Signatures
Files
-
edc777668f9ce5ff6214e2a6cbbef3a0N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ