Try VMRay Platform
Malicious
Classifications

Injector Backdoor

Threat Names

AsyncRAT.v057B AsyncRAT Mal/Generic-S

Dynamic Analysis Report

Created on 2022-08-05T14:25:42+00:00

faaddcf1294c8358fc6ccc4c36ecdc9fccd03ac345b3d022db144798d611397d.exe

Windows Exe (x86-32)
Filters:
File Name Category Type Verdict Actions
C:\Users\RDhJ0CNFevzX\Desktop\faaddcf1294c8358fc6ccc4c36ecdc9fccd03ac345b3d022db144798d611397d.exe Sample File Binary
Malicious
»
Also Known As C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\iexplore\iexplore.exe (Accessed File)
MIME Type application/vnd.microsoft.portable-executable
File Size 3.00 MB
MD5 30e619eed663b6696ba1269dec11e1a9 Copy to Clipboard
SHA1 04ad1454bb163c8e1c5820ba591ae613dd6f6d45 Copy to Clipboard
SHA256 faaddcf1294c8358fc6ccc4c36ecdc9fccd03ac345b3d022db144798d611397d Copy to Clipboard
SSDeep 6144:Pnsnxlpl/4MgsaffkOiBxqwuhiowOskDnlat1JLfwyTeiB0PJo3zzn:fs3pZ4MgzffDwsbikcJpnfn Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
File Reputation Information
»
Verdict
Malicious
Names Mal/Generic-S
PE Information
»
Image Base 0x00400000
Entry Point 0x0044A87E
Size Of Code 0x00048A00
Size Of Initialized Data 0x0002C200
File Type IMAGE_FILE_EXECUTABLE_IMAGE
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2022-08-05 08:22 (UTC+2)
Version Information (7)
»
Comments
CompanyName
FileVersion , , ,
FileDescription
LegalCopyright
ProductName
ProductVersion , , ,
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x00402000 0x00048884 0x00048A00 0x00000200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 5.63
.rsrc 0x0044C000 0x0002BF72 0x0002C000 0x00048C00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 4.52
.reloc 0x00478000 0x0000000C 0x00000200 0x00074C00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain - 0x00402000 0x0004A858 0x00048A58 0x00000000
Memory Dumps (6)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point YARA Actions
faaddcf1294c8358fc6ccc4c36ecdc9fccd03ac345b3d022db144798d611397d.exe 1 0x01350000 0x013C9FFF Relevant Image False 32-bit 0x013832FC False
faaddcf1294c8358fc6ccc4c36ecdc9fccd03ac345b3d022db144798d611397d.exe 1 0x01350000 0x013C9FFF Process Termination False 32-bit - False
iexplore.exe 11 0x003F0000 0x00469FFF Relevant Image False 32-bit 0x004232FC False
iexplore.exe 11 0x003F0000 0x00469FFF Process Termination False 32-bit - False
iexplore.exe 23 0x003F0000 0x00469FFF Relevant Image False 32-bit 0x004232FC False
iexplore.exe 23 0x003F0000 0x00469FFF Process Termination False 32-bit - False
YARA Matches (3)
»
Rule Name Rule Description Classification Score Actions
MultipleNetObfuscatorAttributes .NET file contains multiple obfuscator attributes -
2/5
YanoObfuscatorAttributes Yano Obfuscator Attributes -
VTIRuleScore.INFORMATIVE/5
BabelObfuscatorAttributes Babel Obfuscator Attributes -
VTIRuleScore.INFORMATIVE/5
902cca93c7d7b54c284be59ed63ac8f882b9a1cc58b8bc18da471be3264b196f Code Dump File Stream
Malicious
»
MIME Type application/octet-stream
File Size 42.00 KB
MD5 12a2d25cb5bada1d69199fe75ce47b92 Copy to Clipboard
SHA1 906f3c40be46cf6dfcff3860819945d48cca00e1 Copy to Clipboard
SHA256 902cca93c7d7b54c284be59ed63ac8f882b9a1cc58b8bc18da471be3264b196f Copy to Clipboard
SSDeep 768:suwCfTg46YbWUn8jjmo2qryDwIz90PIUzjbNgX3WpdnUdphBDZ:suwCfTgp/2XP5U3baXGCdpfd Copy to Clipboard
ImpHash -
607c7b32ca17ef830932ceb8f5568e91d51c54555d84ab9f5dddda9ef61fd354 Extracted File Image
Clean
»
Parent File C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\iexplore\iexplore.exe
MIME Type image/png
File Size 14.82 KB
MD5 358a23e6485c2eccf3d0e3881e59b9ba Copy to Clipboard
SHA1 07d3d52af86fd24dcdb9f88f473497bf9be4fff2 Copy to Clipboard
SHA256 607c7b32ca17ef830932ceb8f5568e91d51c54555d84ab9f5dddda9ef61fd354 Copy to Clipboard
SSDeep 384:MrPqXdXyRc+eMekKSYOH2t9mXlYMQNE881ViUzQk09/nnFn:iqXdXyRcweSjYIikQkQp Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image