Behavioral task
behavioral1
Sample
50bde48b7037890d318cf123e23a78f734634cff29354fc5852293d5702737b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50bde48b7037890d318cf123e23a78f734634cff29354fc5852293d5702737b9.exe
Resource
win10v2004-20241007-en
General
-
Target
50bde48b7037890d318cf123e23a78f734634cff29354fc5852293d5702737b9.exe
-
Size
63KB
-
MD5
b2ec5b95b35cf81e713528cfcd795f75
-
SHA1
1bf79e092f88d3638ff927bd6650435cf140cd32
-
SHA256
50bde48b7037890d318cf123e23a78f734634cff29354fc5852293d5702737b9
-
SHA512
106cd9ba2e3f4b57cb8c9a8cedd886c788863c6adfff00953f7c436a8edef3c9d6616552ad7bb714f1a4664d46246feaa66e01f69ad7d627b7947fdad2bb88a8
-
SSDEEP
1536:p2wm8PN1ak1gcKu5UYFaSSIsE5bBAPg/RrQTGlx:p218PN1ak1Ku5UYFaSShE5bB/Gmx
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
zzDefaultPET
deadpoolstart2029.duckdns.org:6090
WinCookies
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
50bde48b7037890d318cf123e23a78f734634cff29354fc5852293d5702737b9.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ