Behavioral task
behavioral1
Sample
Infected.exe
Resource
win7-20240903-en
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
ed84599b85e02fc16b0763d9158e7691
-
SHA1
d508b2240df9c3b36ea315aab8370ab6d76724b2
-
SHA256
ac038502c851488f63a577e3b51c951892c8104934ca68e05bffe8b12a3099bc
-
SHA512
b55cdeaeda4070f6bdce9516d47bc5037177704d9fa4ea02866bd9804ef1d8f2dd035625709b4d52d8ac4db3497bb06f2c4e19f80de5eafd8321b09897e07515
-
SSDEEP
768:ZJ4BeNf5g78fIC8A+XayazcBRL5JTk1+T4KSBGHmDbD/ph0oX78vsRSukdpqKYhg:cq5UZdSJYUbdh9wEoukdpqKmY7
Malware Config
Extracted
asyncrat
Breeze
FederalServices-21439.portmap.host:21439
-
delay
1
-
install
true
-
install_file
service.exe
-
install_folder
%Temp%
Signatures
Files
-
Infected.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ