Behavioral task
behavioral1
Sample
e4384cce1f9ea5e5c1e2fdb0af7ed8f25724c2618e462ae9fced298c24d7b095.exe
Resource
win7-20240704-en
General
-
Target
e50e5c919322ad54bd5ed6eefba01619.bin
-
Size
31KB
-
MD5
ec2c403253c45bcc30a180d5b6147691
-
SHA1
7b53a11a57b7f5e43415fcd6697354d645bcb9d3
-
SHA256
9b380ae26ffeae4cd67172891204fca13d02fc5a579e278233cb75afd36c054c
-
SHA512
567442a753f41d9dce07253d6b4f467ca253242b26021fb29a0e1f8090e9c671950375a79dccfb90fa5f07702b8f42a32786116c04b04f2eefc2a934bfd2a28b
-
SSDEEP
768:D/gWMUK3+V0Er9E07ZLGZo4diIVYGLf/VveYu/RQV:DoWnK3+VgaLGWgiIdLftxu/RQV
Malware Config
Extracted
asyncrat
SuperBoo Rat v1.1
Default
com-distinct.gl.at.ply.gg:26706
SuperBoo_mtex_920393
-
delay
3
-
install
true
-
install_file
gang.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/e4384cce1f9ea5e5c1e2fdb0af7ed8f25724c2618e462ae9fced298c24d7b095.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e4384cce1f9ea5e5c1e2fdb0af7ed8f25724c2618e462ae9fced298c24d7b095.exe
Files
-
e50e5c919322ad54bd5ed6eefba01619.bin.zip
Password: infected
-
e4384cce1f9ea5e5c1e2fdb0af7ed8f25724c2618e462ae9fced298c24d7b095.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ