Try VMRay Platform
Malicious
Classifications

Spyware Backdoor

Threat Names

AsyncRAT DCRat Mal/HTMLGen-A

Filters:
File Name Category Type Verdict Actions
C:\Users\RDhJ0CNFevzX\Desktop\Client.exe Sample File Binary
Malicious
»
MIME Type application/vnd.microsoft.portable-executable
File Size 104.50 KB
MD5 e7a068d43b883388322f26512b8c07e6 Copy to Clipboard
SHA1 7852efb26c825fdb1f03c74228b94a192c661c92 Copy to Clipboard
SHA256 3f992a9724fad98b398c0369e94cf4dc8487015c115eaa7b94261310e1097af9 Copy to Clipboard
SSDeep 1536:TS8KrAXzsprs4yV2iBL4B0g1dbq/zsEefusI9sXKG12dzKX3UtpqKmY7:T3KAUY3Bg0Gbq/WpIikdkk2z Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
File Reputation Information
»
Verdict
Malicious
PE Information
»
Image Base 0x00400000
Entry Point 0x0041AE0E
Size Of Code 0x00019000
Size Of Initialized Data 0x00001000
File Type IMAGE_FILE_EXECUTABLE_IMAGE
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2022-07-10 08:29 (UTC)
Version Information (11)
»
Comments -
CompanyName -
FileDescription -
FileVersion 1.0.7.0
InternalName Client.exe
LegalCopyright -
LegalTrademarks -
OriginalFilename Client.exe
ProductName -
ProductVersion 1.0.7.0
Assembly Version 1.0.7.0
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x00402000 0x00018E14 0x00019000 0x00000200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 5.76
.rsrc 0x0041C000 0x00000DB5 0x00000E00 0x00019200 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.03
.reloc 0x0041E000 0x0000000C 0x00000200 0x0001A000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain - 0x00402000 0x0001ADDC 0x00018FDC 0x00000000
Memory Dumps (6)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point YARA Actions
client.exe 1 0x00BC0000 0x00BDFFFF Relevant Image False 64-bit - False
buffer 1 0x1AC6A000 0x1AC6FFFF First Network Behavior False 64-bit - False
buffer 1 0x1A72D000 0x1A72FFFF First Network Behavior False 64-bit - False
buffer 1 0x00143000 0x0014FFFF First Network Behavior False 64-bit - False
client.exe 1 0x00BC0000 0x00BDFFFF First Network Behavior False 64-bit - False
client.exe 1 0x00BC0000 0x00BDFFFF Final Dump False 64-bit - False
YARA Matches (2)
»
Rule Name Rule Description Classification Score Actions
AsyncRAT AsyncRAT Backdoor
5/5
DCRat DCRat Spyware
5/5
f62ed6e6f7162e7886a16bdeb75928e9c72b6b28a4e575ac9ca378854d0c539b Downloaded File Text
Clean
»
MIME Type text/plain
File Size 20 Bytes
MD5 dca6a37eedc08825d314497d579fd577 Copy to Clipboard
SHA1 c505c38e36f1ef5175579c198a8ef6101cdfcefb Copy to Clipboard
SHA256 f62ed6e6f7162e7886a16bdeb75928e9c72b6b28a4e575ac9ca378854d0c539b Copy to Clipboard
SSDeep 3:4O/FXe:4OtO Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image