Analysis

  • max time kernel
    74s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2023 23:39

General

  • Target

    Venom_RAT_SOURCE_CODE/Venom RAT + HVNC/Quasar/Server/Forms/FrmReverseProxy.js

  • Size

    5KB

  • MD5

    1aabdee3e5b7f73fe91f845602c0cae1

  • SHA1

    db2fd9611e76503dbc613c7f17cc049458b28505

  • SHA256

    1d5bd452e822ce9547ebf38aa9bb280dbb920f4ec036a72e18fbec7df5f34936

  • SHA512

    f9ba3674c1c0d515c9aab11276cf4ec3f63c53acbfd10bf30a2e4f324f93adf58dc4b70843a8be9653dfa74f8dc1d605dfe5b86fcb1dad35ee5622cad07000f5

  • SSDEEP

    96:Jo4Dz07lj53UZV9nW+ha+dVieWzKwcerMJNe+1KyPlVDRR2iUzjQji7:9fE3UD9nW9xejwcerEe+13d3R2iUAji7

Score
1/10

Malware Config

Signatures

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Venom_RAT_SOURCE_CODE\Venom RAT + HVNC\Quasar\Server\Forms\FrmReverseProxy.js"
    1⤵
      PID:1064

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads