Analysis
-
max time kernel
130s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-06-2022 10:41
Behavioral task
behavioral1
Sample
_-Venom.exe
Resource
win7-20220414-en
General
-
Target
_-Venom.exe
-
Size
534KB
-
MD5
b0f6e15f83e03ea0ab502951b62c3dbf
-
SHA1
feeb74ad283f27e9eb5e96dccc9fa1c44eab00be
-
SHA256
6b39407f3c2b6064f483c474c9359f344f2aa8e0afef0941d33deddbc275fdb2
-
SHA512
8641c8a0b9b46e62a91d2d47a240a8df030394fbf2460d1327428daa46fc8fbf6950d799f9c17c710473712cf44cdb016ba7d4dffeabd6f0912b65874429da45
Malware Config
Extracted
quasar
2.1.0.0
Office04
littlehf.ddns.net:4566
VNM_MUTEX_au1VZH90ssfu7up6jn
-
encryption_key
XZHIHOgylm3qxGXtmm9j
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4688-130-0x0000000000F80000-0x000000000100C000-memory.dmp disable_win_def -
Quasar Payload 1 IoCs
resource yara_rule behavioral2/memory/4688-130-0x0000000000F80000-0x000000000100C000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4688 _-Venom.exe Token: SeDebugPrivilege 4688 _-Venom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4688 _-Venom.exe