Behavioral task
behavioral1
Sample
virustest1.exe
Resource
win7-20230712-en
General
-
Target
virustest1.exe
-
Size
74KB
-
MD5
49b68aeb3b57323258daf4f2ee220506
-
SHA1
96c46b9380a9c143200632e177ab5fe1e559b8a3
-
SHA256
58086d229f3554f9677251fad3c82b7c902ffb654082a54da52c22f60a91a7d3
-
SHA512
7e6c7f3e104c2c63ec6ce98f552e45ae26a025c7e7cae6c9a1b3b0f465559cb0474c6dcf5dfa65982426cb08b312f483a01581dc159b6c16494e72edd9e1a58f
-
SSDEEP
1536:SUKkcx9pXCTyPMVDEUJndIlH1bm/JzPNQzcSLVclN:SUDcx958yPMVzeH1bm1NQDBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
18.158.249.75:4824
18.158.249.75:12395
Discord Inc
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
Files
-
virustest1.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ