Behavioral task
behavioral1
Sample
a2971bc379a09844bf838fdfc79165e50e851eab7ef965529da712f57c989b78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2971bc379a09844bf838fdfc79165e50e851eab7ef965529da712f57c989b78.exe
Resource
win10v2004-20241007-en
General
-
Target
a2971bc379a09844bf838fdfc79165e50e851eab7ef965529da712f57c989b78
-
Size
69KB
-
MD5
d147a5fa86d3f82fde1cfefe7c133cdd
-
SHA1
0d202133fa8724f0ebb95788bfaf0002b8ae1d28
-
SHA256
a2971bc379a09844bf838fdfc79165e50e851eab7ef965529da712f57c989b78
-
SHA512
feddc30eafce60f42f307b5825d6c7ee47672a24c712346a4cde265e49fc53a39aeba8e27ca85757ee4ffe1bca186a46684e9db899ead0ca61113c78732c44a8
-
SSDEEP
1536:AuUbUfRckg00KuGUYFE7s0v/s5w/b5OnGlBl4zwTrPlTGix:AukUfRckMKuGUYFErAwb5Tl8MTdRx
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
lila152512.duckdns.org:1234
AsyncMutex_Default
-
delay
3
-
install
false
-
install_file
poder.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a2971bc379a09844bf838fdfc79165e50e851eab7ef965529da712f57c989b78
Files
-
a2971bc379a09844bf838fdfc79165e50e851eab7ef965529da712f57c989b78.exe windows:4 windows x86 arch:x86
3bfa8fb1c3047a00e530ff9042355622
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ucrtbase
lroundf
lroundf
normf
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ