Try VMRay Platform
Malicious
Classifications

Backdoor

Threat Names

Mal/Generic-S AsyncRAT.v057B AsyncRAT Mal/HTMLGen-A

Dynamic Analysis Report

Created on 2022-08-05T20:04:15+00:00

da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5.exe

Windows Exe (x86-32)
Filters:
File Name Category Type Verdict Actions
C:\Users\RDhJ0CNFevzX\Desktop\da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5.exe Sample File Binary
Malicious
»
Also Known As C:\Users\RDhJ0CNFevzX\AppData\Roaming\RhFYnHFgJ.exe (Accessed File)
MIME Type application/vnd.microsoft.portable-executable
File Size 606.50 KB
MD5 44e407b3de4a9865ab747bdca810b0b9 Copy to Clipboard
SHA1 6eb199e6837432d8acb98c03b22277f340726372 Copy to Clipboard
SHA256 da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5 Copy to Clipboard
SSDeep 12288:4H2iNSg6SKlpxxDAE7Mn3cs9OWvHoFiPEwjlk2Y/gbb:81SLlpxx8EEc85oFaj22p Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
File Reputation Information
»
Verdict
Malicious
Names Mal/Generic-S
PE Information
»
Image Base 0x00400000
Entry Point 0x00499162
Size Of Code 0x00097200
Size Of Initialized Data 0x00000600
File Type IMAGE_FILE_EXECUTABLE_IMAGE
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2022-08-01 08:34 (UTC+2)
Version Information (11)
»
Comments
CompanyName Microsoft
FileDescription Library Docks
FileVersion 1.0.0.0
InternalName TypeLibVarFl.exe
LegalCopyright Copyright © 2018
LegalTrademarks
OriginalFilename TypeLibVarFl.exe
ProductName Library Docks
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x00402000 0x00097168 0x00097200 0x00000200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 7.27
.rsrc 0x0049A000 0x000003A8 0x00000400 0x00097400 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 2.97
.reloc 0x0049C000 0x0000000C 0x00000200 0x00097800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain - 0x00402000 0x00099138 0x00097338 0x00000000
Memory Dumps (11)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point YARA Actions
da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5.exe 1 0x00400000 0x0049DFFF Relevant Image False 32-bit - False
buffer 1 0x04750000 0x0475FFFF Reflectively Loaded .NET Assembly False 32-bit - False
buffer 1 0x04920000 0x04922FFF Reflectively Loaded .NET Assembly False 32-bit - False
buffer 1 0x09EE0000 0x09F3AFFF Reflectively Loaded .NET Assembly False 32-bit - False
da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5.exe 1 0x00400000 0x0049DFFF Final Dump False 32-bit - False
buffer 1 0x04170000 0x0417DFFF Reflectively Loaded .NET Assembly False 32-bit - False
buffer 7 0x00400000 0x00411FFF Content Changed False 32-bit - False
da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5.exe 1 0x00400000 0x0049DFFF Process Termination False 32-bit - False
buffer 7 0x0430E000 0x0430FFFF First Network Behavior False 32-bit - False
buffer 7 0x00199000 0x0019FFFF First Network Behavior False 32-bit - False
buffer 7 0x00400000 0x00411FFF First Network Behavior False 32-bit - False
1ee85723808362f3410088df80f589348c3e886ce456f4a59d3dc19bce4ec7a8 Code Dump File Stream
Malicious
»
MIME Type application/octet-stream
File Size 44.50 KB
MD5 1a986fe638c494f19302613082aefacf Copy to Clipboard
SHA1 e546ace6e4635ae09bcaf12a2221ed03468a2f39 Copy to Clipboard
SHA256 1ee85723808362f3410088df80f589348c3e886ce456f4a59d3dc19bce4ec7a8 Copy to Clipboard
SSDeep 768:6uC0NTgoZqNYhWU58PnLmo2qrNuIWBqxrPIBbQ7Ov0brbDTw70fFSVTSXr6KOdI9:6uC0NTgmq12WUBbQ7OsbrbDT00dSVTSl Copy to Clipboard
ImpHash -
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpF9CA.tmp Dropped File Text
Clean
»
MIME Type text/xml
File Size 1.56 KB
MD5 7f50080658ece04e97c8ee0ff35f561b Copy to Clipboard
SHA1 6866c7a05ae9229d4ad4995c9d30160c5a5aee26 Copy to Clipboard
SHA256 7ad7f1c3663eddd7c8ce47f00249cbd4b582d3a7b35d97f2648228370b4702c2 Copy to Clipboard
SSDeep 24:2di4+S2qh9Y1Sy1mlUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt6axvn:cge2UYrFdOFzOzN33ODOiDdKrsuT6uv Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image