Behavioral task
behavioral1
Sample
AutoClicker.exe
Resource
win10v2004-20240802-en
General
-
Target
AutoClicker.exe
-
Size
95KB
-
MD5
f6fde0bc336d4ea3c9b0b08b283091e2
-
SHA1
29975a4c83eda2cca9f8ab3956a3a194bbc2641b
-
SHA256
0f044c16ebd200fbebf907287ca8d7c9c5c422759f3dca3f67af48552c32de0c
-
SHA512
4dc3c278110a543db57073633322b99a3ac2de430a2d7c92973998bea741aaa4d61efc12970f659efa436ebd24f57cb2edd00194f9bc157f267b5810a7ea1a4e
-
SSDEEP
768:6AJyBeNf5g78fIC8A+XaTfp8ex0AMA71+T4YSBGHmDbDrphCoX+vHSWAnKSu1+UV:6zq5UMx0VUTYUbZh7Rd9u1+UdpqKmY7
Malware Config
Extracted
asyncrat
Default
they-side.gl.at.ply.gg::36567
-
delay
1
-
install
true
-
install_file
Ι德贼吾.exe
-
install_folder
%AppData%
Signatures
Files
-
AutoClicker.exe.exe windows:4 windows x86 arch:x86
Password: 4yk-04h3j34j3j4j3jj
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ