Behavioral task
behavioral1
Sample
Rbxbooster.exe
Resource
win7-20230712-en
General
-
Target
Rbxbooster.exe
-
Size
78KB
-
MD5
fd2a20d4c52132b731d6fbb00cd2eead
-
SHA1
e2e226945846a75ec4d4d8bafe98e2c9b8184452
-
SHA256
de872e7b2e56fa0921b2024d69944ca7c3e1dc8e04eb679a623c1106c86725cf
-
SHA512
6c3c6b432027604060ab2201885529dd8efbc7c19ad7cf5c2db3ce5cc68343ef31ebd23a1eebe9489568038aa8b7b6919684cc968aac9911b6f13be314e67bb6
-
SSDEEP
1536:SUjgcx0lqaN8C/WPMV6XBBeMfIEH1b6/83rQzcLLVclN:SUUcx0lqaKUWPMVaBpdH1b6E7QmBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Windows
3.127.138.57:16608
3.127.138.57:5403
18.156.13.209:16608
18.156.13.209:5403
18.192.93.86:16608
18.192.93.86:5403
18.157.68.73:16608
18.157.68.73:5403
3.126.37.18:16608
3.126.37.18:5403
18.197.239.5:16608
18.197.239.5:5403
Chrome.exe
-
delay
1
-
install
true
-
install_file
ChromeUpdate.exe
-
install_folder
%AppData%
Signatures
Files
-
Rbxbooster.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ