Behavioral task
behavioral1
Sample
1812-80-0x0000000000400000-0x0000000000418000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1812-80-0x0000000000400000-0x0000000000418000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1812-80-0x0000000000400000-0x0000000000418000-memory.dmp
-
Size
96KB
-
MD5
4eba7a0f12e25bdf7f94e1d3015cc8e4
-
SHA1
1635b09ccf28befa3385445d7f56802dcb460947
-
SHA256
2e038fedfac84e85ccbc2e4b6f3a33e08a739471d8dfe80beb43f06da3c9cc06
-
SHA512
30bda581ac6f0ac4672cdfb5460515851bfe22164431b7f8733ffd25e75bab43e573c1fe173be8ea3ec39fb9f3b0a4d17b0953613c3bb26797a311b2d1ebd9f6
-
SSDEEP
1536:8UUPcxVteCW7PMV97mIXBGNIptZ1bq/j6N8tnQzcBLVclN:8UmcxV4x7PMVUaBGwtZ1bqLT5QYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
Default
37.196.152.120:4449
nucflbafpaqx
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
1812-80-0x0000000000400000-0x0000000000418000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ