Behavioral task
behavioral1
Sample
2964-121-0x00000000004E0000-0x00000000004F2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2964-121-0x00000000004E0000-0x00000000004F2000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2964-121-0x00000000004E0000-0x00000000004F2000-memory.dmp
-
Size
72KB
-
MD5
adb3b17d7566c871f96c70c941b8f812
-
SHA1
a8aeb1a4aeda455ec80ef48f7d62a4d8da2fa8b0
-
SHA256
87a2f463105b0a1fd99cdc38209ef0b37d82c7ea1dd1fa5dc4368d3d121a8eba
-
SHA512
eb9e251174db3b1613241b978a46152d133245f4e4d104d1e051f9520be3f9216c23c7bcf0f2dd09aa75b5ed887699ce218c92d2c55f995ded75f903ef54a983
-
SSDEEP
1536:0u6ZdTv2S2vSIHTx/SLSnbetjX44qPIv0NZjLd/x:0u6vTv2S2vScNSL4betrITLtx
Malware Config
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
oTA1Qk0GTnww
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2964-121-0x00000000004E0000-0x00000000004F2000-memory.dmp
Files
-
2964-121-0x00000000004E0000-0x00000000004F2000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ