General
-
Target
Dc.exe
-
Size
47KB
-
MD5
ff744d24089c2b37d56b4483c6db217a
-
SHA1
4de25b3c976c958aa83d868ee4e8f891b1df1ef2
-
SHA256
3afbdfdaf9738f85294d3b1179e6e3200b8aeccfb38b9caf8dd6c25ac9f5bdb8
-
SHA512
fa84b86856665619b2a720db84c92beacf0dcbca976cc29ed2018a7d07afab6a2d29e4d07dc060a5a98e029adcdb6d247e4585bbf59fdd75be4c00721234ddbc
-
SSDEEP
768:Zy+0zzILMmY4+jiRUvi56lxYbIgezKD6cGpIvEgK/JDZVc6KN:E+SQR8sbfzD6/InkJDZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
necatisoff-36486.portmap.host:36486
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
wdf.exe
-
install_folder
%Temp%
Signatures
Files
-
Dc.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ