Behavioral task
behavioral1
Sample
1960-56-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1960-56-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1960-56-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
f31ac10373d5566ed4d0cffaec769ade
-
SHA1
4018cacab0727f682ec8e49eca66d37365f63168
-
SHA256
0395a0e1db6f489e11fb5a9b01544b8b4428a7dbbbbf261ef370ee2ca801c541
-
SHA512
ad0cd1bdce3f4b6134b4d5e046a83e2f755f54160566b5254a8d94d4f2ec9dc2106320e2335bbb84c5dcb07920c46bd1e982eb54994250bd352b42677e7941a4
-
SSDEEP
1536:mUGngcxGtEXCrWPMV15raKIjH1bx/cZMFiQzcELVclN:mUGgcxGtkQWPMVzranH1bxUOQQZBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
O365
111.90.149.195:5111
111.90.149.195:7766
4ac24af1-9eb0-4f83-aa69-9a23a66819
-
delay
2
-
install
false
-
install_folder
%Temp%
Signatures
Files
-
1960-56-0x0000000000400000-0x000000000041C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ