Behavioral task
behavioral1
Sample
556-71-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
556-71-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
556-71-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
4c57947560e7fa7a92f6371198ad88fc
-
SHA1
d08865809dc568a664b50b0c2d273f619d5163fd
-
SHA256
01d077a0ae5b9d783faee5f7cce1890292fd31a85d297d3f0748bd4a6307febf
-
SHA512
99a420db615ec41619bf58c3812cb5734a8f3e3770d049fc94e6a02d885de7189af7097ef307d7d221e4c318ba9804626d3ae3f53523b4eb71bced1bd8118807
-
SSDEEP
1536:WUGngcxGtEXCrWPMVwXOQI1H1bT/mjviQzcAbVclN:WUGgcxGtkQWPMVwXIH1bTe+Q1RY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
V365
111.90.149.195:5111
111.90.149.195:7766
4ac24af1-9eb0-4f83-aa69-9a23a66ab177
-
delay
2
-
install
false
-
install_folder
%Temp%
Signatures
Files
-
556-71-0x0000000000400000-0x000000000041C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ