Behavioral task
behavioral1
Sample
23945d9be12e6b34aae896ef68d098f922b1f972e3d85f499d322192187fd6d2.exe
Resource
win7-20240903-en
General
-
Target
2d928d57b8ff1b3414001e22475a45fd.bin
-
Size
33KB
-
MD5
44144fdbeb88854f1ac378876a2dbb0b
-
SHA1
8f96fdae7fb368b72dd0361456563765fc86491c
-
SHA256
f3118eb4da8b6ef78293f4ddaa1c9a6e28221f7c23b554ee4098ab2797200a12
-
SHA512
38c11963c81bcc118171a546413634120e6d1ad3497f3191e593f78115e73e03ba3067af0e099be4e4ee25361e112a5d787884e59a83684214345e487032ca86
-
SSDEEP
768:MozuoDFG9bWXI8IZ/AKlxVER+Eywg6o+VPkJbQucSa:BuuKKXu/hXER+6x5gb+Sa
Malware Config
Extracted
asyncrat
Xchallenger | 3Losh
1
207.231.111.146:7707
207.231.111.146:8808
207.231.111.146:0077
207.231.111.146:0007
207.231.111.146:6666
207.231.111.146:7777
207.231.111.146:1996
207.231.111.146:2106
AsyncMutex_43520e43afs
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/23945d9be12e6b34aae896ef68d098f922b1f972e3d85f499d322192187fd6d2.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/23945d9be12e6b34aae896ef68d098f922b1f972e3d85f499d322192187fd6d2.exe
Files
-
2d928d57b8ff1b3414001e22475a45fd.bin.zip
Password: infected
-
23945d9be12e6b34aae896ef68d098f922b1f972e3d85f499d322192187fd6d2.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ