Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
General
-
Target
tmp
-
Size
74KB
-
MD5
6b5597e5b74bf79b641a66ac7397af30
-
SHA1
6c503fa5a13d7ff36e13334aca2455df606c450f
-
SHA256
93d6f6ea5117c0551dc568b53986031602138eb710532f14d7af532a60504ee6
-
SHA512
dfbecf5a9ca83d7749c8853afa00628809bd0a7ee51e2c77d49adb2009564345296002ab8414c9abe04257a472c06cea315b88ab9618a918fab1df1e819dbcb0
-
SSDEEP
1536:8U7AcxOIWC72PMVus7lzKmu5iI6H1ba/UY91huQzc2LVclN:8UscxONo2PMVushpfH1bah9fuQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:11451
46.153.20.70:4449
46.153.20.70:11451
wdwbqweylcmr
-
delay
1
-
install
false
-
install_folder
%Temp%
Signatures
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ