Behavioral task
behavioral1
Sample
1688-449-0x0000021C4DE00000-0x0000021C4DE2C000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1688-449-0x0000021C4DE00000-0x0000021C4DE2C000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1688-449-0x0000021C4DE00000-0x0000021C4DE2C000-memory.dmp
-
Size
176KB
-
MD5
ba0b777de3a6a9a3180f2dc6ea002a07
-
SHA1
d3ff8487c3c74fcad06c20c423c15e026503ebab
-
SHA256
5883d006fa7bc455ce2dc1260b18100c1a9e89c9a5357b2b7991eb9f2c15b66b
-
SHA512
6e08f173b4a1d9e5cfbe69b392e103216a2603c11fc9009396be8295ee748bc4df7819b1963e87eaf710b96c7750edefecd745ec76674e103a1aacd8180925a9
-
SSDEEP
3072:AJwPUfRrKrG6c7QnURZbZfwSMXaf69ez:geUfuyXZb5wSt
Malware Config
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1688-449-0x0000021C4DE00000-0x0000021C4DE2C000-memory.dmp
Files
-
1688-449-0x0000021C4DE00000-0x0000021C4DE2C000-memory.dmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ