Behavioral task
behavioral1
Sample
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe
Resource
win10v2004-20240226-en
General
-
Target
6783cedfbb7ee848a0bb6e5f9e849945.bin
-
Size
826KB
-
MD5
5a2eebc985ab3e7c01c69123e24cfcd0
-
SHA1
db54a2e1f7de402ddd7b62d7016a0f8aa69a87d2
-
SHA256
30b269ab236535ccb2035e6c2b66655cb30889a92b2218de90e22725a127c19b
-
SHA512
6f627130c9b7ab3643cfe915bc24055dddcc3209324c34370cba1f6e5bc4d33ce3407f5b1c36bf3bc57d70ccd16ef8d553453d67f9eee9952c900701db138618
-
SSDEEP
24576:VAheYhxZOkRlKoUEpGmXR+kYud5TvuSAPUZTA0o:+heYnUkRlXXpGId5LBEt
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe
Files
-
6783cedfbb7ee848a0bb6e5f9e849945.bin.zip
Password: infected
-
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ