General
-
Target
svchost.exe
-
Size
42KB
-
Sample
230131-pv2mlaaa7w
-
MD5
a184997f7fb21c53e838fb30f265fa73
-
SHA1
ba53c020bb15ec804b1bf69425d7694b70c7ab66
-
SHA256
98fc50a25512d2ac4673c05bee1f757b36fe812ba6981465ff8faec50d78d0c2
-
SHA512
b29702060ec94c68d6f00b1016dbcd440ea248010afe6497c647cdab8ad8144453f6798cffd32e4f031c73b3550197fd4d30ed0e6c5debde0bb9c9f42751a4e8
-
SSDEEP
768:UaJ45P5jHWSDAYsAYHWmfsVi/jV09VCBJifoeH5zFi/30NZXggkXoyiRs:UaSsi3s3Ht0ViLV0zgJifo2Q3CZw5Xog
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
VenomRAT+HVNC+Stealer Version:5.0.9
Minecraft Clients
178.211.139.47:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
svchost.exe
-
Size
42KB
-
MD5
a184997f7fb21c53e838fb30f265fa73
-
SHA1
ba53c020bb15ec804b1bf69425d7694b70c7ab66
-
SHA256
98fc50a25512d2ac4673c05bee1f757b36fe812ba6981465ff8faec50d78d0c2
-
SHA512
b29702060ec94c68d6f00b1016dbcd440ea248010afe6497c647cdab8ad8144453f6798cffd32e4f031c73b3550197fd4d30ed0e6c5debde0bb9c9f42751a4e8
-
SSDEEP
768:UaJ45P5jHWSDAYsAYHWmfsVi/jV09VCBJifoeH5zFi/30NZXggkXoyiRs:UaSsi3s3Ht0ViLV0zgJifo2Q3CZw5Xog
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-