Behavioral task
behavioral1
Sample
Zaramethod.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Zaramethod.exe
Resource
win10v2004-20240802-en
General
-
Target
Zaramethod.txt
-
Size
175KB
-
MD5
554d56cb96f934873e65079ad3a71302
-
SHA1
6e36e670839100fdc087dd038c22b03c15bfebd8
-
SHA256
4f1219c2250dbab26594303dd745a809c8b6fba6a00ff7e076509c11fc478d5a
-
SHA512
d52ab70689b660d09fc4bdf8a672d5e19374e9c21c5b8d45fd400335560e06c21dacaa132cc1208301422803ea4806bac6e2b77ffb2d69abae7da6e028684f09
-
SSDEEP
3072:Ae8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTQwARE+WpCc:U6ewwIwQJ6vKX0c5MlYZ0b2d
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7213253766:AAF4LQi0jeopDQmLci3GdnUpi7-g95BOspQ/sendMessage?chat_id=7212464192
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Zaramethod.txt
Files
-
Zaramethod.txt.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ