General
-
Target
NOW.exe
-
Size
45KB
-
MD5
fb19d76bb03a30246b3319104e21104c
-
SHA1
90267afd3a51a6573e96aa3821b5e071cb2cc5b7
-
SHA256
a19cbe0dbcd757bb8b6a83d7703e980f1d59707b970dcc57a03ac7de69a0d978
-
SHA512
0edc7cfa691b617f997353c0289a062d9b2d64c2cb0a73e171a2c111d3269859c94b930e42924fbf4bd8c9c0ea7cb1aa5f879f8524189a70d3884040642a47cd
-
SSDEEP
768:du/LuTMUzwJbWUnBtJmo2qVp0WGJAQG8PPIiLjbUgX3iBeP57LTp3WiyBDZ3x:du/LuTMzX20lVlifb7XSB2Xd3Wtd3x
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:62565
127.0.0.1:139
127.0.0.1:56150
127.0.0.1:8325
127.0.0.1:4782
Cristopher11sa-62565.portmap.host:6606
Cristopher11sa-62565.portmap.host:7707
Cristopher11sa-62565.portmap.host:8808
Cristopher11sa-62565.portmap.host:62565
Cristopher11sa-62565.portmap.host:139
Cristopher11sa-62565.portmap.host:56150
Cristopher11sa-62565.portmap.host:8325
Cristopher11sa-62565.portmap.host:4782
190.104.116.8:6606
190.104.116.8:7707
190.104.116.8:8808
190.104.116.8:62565
190.104.116.8:139
190.104.116.8:56150
190.104.116.8:8325
190.104.116.8:4782
azxq0ap.localto.net:6606
azxq0ap.localto.net:7707
azxq0ap.localto.net:8808
azxq0ap.localto.net:62565
azxq0ap.localto.net:139
azxq0ap.localto.net:56150
azxq0ap.localto.net:8325
azxq0ap.localto.net:4782
E2qgtjRHaRSi
-
delay
3
-
install
false
-
install_file
Java updater.exe
-
install_folder
%AppData%
Signatures
Files
-
NOW.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ