Behavioral task
behavioral1
Sample
b7e02e83cffbaa610880b99c79a3a47f745e10b02c62c67f7af49de4e6dbce78.exe
Resource
win7-20240903-en
General
-
Target
8190d33b2f4e311feb06e2f1ebc70b9a.bin
-
Size
23KB
-
MD5
2dd6b7c3ccd4e18b48b32d1338ca0f70
-
SHA1
539cf618f0889efaa6d382c0760269f996ee973f
-
SHA256
2a90ea5e7a4b8172198b2a090cb9b3fa40c12dd913272826d4a1478a61a5511e
-
SHA512
df35cdafd8c8bb3d831eb0b17e0195a42d2bd6fb9f266ad490c47efa04335ea9b773be676cb4138ef9943fc90182dcf9c20af783d4419143a45c5fae2ee6305c
-
SSDEEP
384:AoMnNUa2GHc+/bzkWv2OqD1BS67yyFbSbHhsxW07U9q8+qOqD+feGsa2zjTTE6:XMnORG8asyeMB08X+feGJip
Malware Config
Extracted
asyncrat
1.0.7
Default
dhjsjjshdtge.duckdns.org:8010
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_file
junio.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/b7e02e83cffbaa610880b99c79a3a47f745e10b02c62c67f7af49de4e6dbce78.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b7e02e83cffbaa610880b99c79a3a47f745e10b02c62c67f7af49de4e6dbce78.exe
Files
-
8190d33b2f4e311feb06e2f1ebc70b9a.bin.zip
Password: infected
-
b7e02e83cffbaa610880b99c79a3a47f745e10b02c62c67f7af49de4e6dbce78.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ