Analysis
-
max time kernel
130s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-03-2023 15:33
Static task
static1
Behavioral task
behavioral1
Sample
Venom5-HVNC-Rat.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
600 seconds
General
-
Target
Venom5-HVNC-Rat.exe
-
Size
9.6MB
-
MD5
7e0817e3a41335f54a977e51fc226d16
-
SHA1
7d8d8fa29e93485411c9071e5add28027ca6b4b5
-
SHA256
13c2f14da985be19ee598514bd96e8a7a75ebfa297560d8bc64f9673693b3c67
-
SHA512
ccfab96b17073a70f85e01f8e322a0836439ca08fab58de359a732ed48136ee2a08c1cb55f1a63f421f70f3a778960bb3392c69fce448637a62e0f2e88e899d8
-
SSDEEP
196608:J1hG0XvXdb5e0hnHTW3GwhXscv84MzaVpXeEWgJfbC1xllS7o/rlf4:J15db5eaHT4GYrvbMG6K+jQ4hw
Score
1/10
Malware Config
Signatures
-
Processes:
Venom5-HVNC-Rat.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main Venom5-HVNC-Rat.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Venom5-HVNC-Rat.exepid process 996 Venom5-HVNC-Rat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Venom5-HVNC-Rat.exepid process 996 Venom5-HVNC-Rat.exe 996 Venom5-HVNC-Rat.exe