General
-
Target
VQUOHFWAS01RVBEUJAS_001.exe
-
Size
300.0MB
-
Sample
221014-waka5sdhe5
-
MD5
6a82206ff1fe448ca175471b12b246ab
-
SHA1
69b656aef476f98feb4d3303a1883026aadf22ca
-
SHA256
df54b9860fdba9bd38a3cee13daac0ec72292701fc355d8011efcf8c37f2d2e9
-
SHA512
0acbfb370a445e5ca1cf7dfdd586c4b533e98a8940f25db99c0a282bb3440b0008412784c940969e1d00711ff91b93780f9d6ee10105b4a7391a84f2a901c57d
-
SSDEEP
3072:xdLp/U+4Ut4dakGX8m0hBtQNq7t/ykXww6r50iis79KaTYVY:f4q4QkXDFI5Fjhd
Static task
static1
Behavioral task
behavioral1
Sample
VQUOHFWAS01RVBEUJAS_001.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
VQUOHFWAS01RVBEUJAS_001.exe
Resource
win10-20220901-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
edwardthornton163.duckdns.org:6444
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
VQUOHFWAS01RVBEUJAS_001.exe
-
Size
300.0MB
-
MD5
6a82206ff1fe448ca175471b12b246ab
-
SHA1
69b656aef476f98feb4d3303a1883026aadf22ca
-
SHA256
df54b9860fdba9bd38a3cee13daac0ec72292701fc355d8011efcf8c37f2d2e9
-
SHA512
0acbfb370a445e5ca1cf7dfdd586c4b533e98a8940f25db99c0a282bb3440b0008412784c940969e1d00711ff91b93780f9d6ee10105b4a7391a84f2a901c57d
-
SSDEEP
3072:xdLp/U+4Ut4dakGX8m0hBtQNq7t/ykXww6r50iis79KaTYVY:f4q4QkXDFI5Fjhd
Score10/10-
Async RAT payload
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-