Behavioral task
behavioral1
Sample
1356-59-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1356-59-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1356-59-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
ad664d536cbbb02137180f4f654ba470
-
SHA1
9460dfdc8c6744857cb2897926904ab2d6146e75
-
SHA256
b7b571b1dfe7ab0c18dcc41504bbca8a23ab7cfbe6a99198d42241d914cdaf05
-
SHA512
b3446b5e99228e09d560759946d1b7b6c10b4c8ae60d85bf3f55f1f2720b34a7ca0fa0ab3b5574de5285e7674081121ee94acf5286e133bf30a311acea0f277a
-
SSDEEP
768:2d2S0/X2EiPz1YiH9JW+cXveeObMbNqV1+WSCv7mqb2nIpwH1opZlXOYhhC6hyGj:2AX2Dd7eeiIVUGbbXw+ZThhCZGj
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
venom12345.duckdns.org:4449
venomunverified.duckdns.org:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Files
-
1356-59-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ