Behavioral task
behavioral1
Sample
virus.exe
Resource
win7-20230831-en
General
-
Target
virus.exe
-
Size
74KB
-
MD5
3fa0d7f9b4121f780b288f8c0abf7294
-
SHA1
10f04fef54c73dccd7cc24a5ab5c84731988f5a2
-
SHA256
c59eb755bf1ae526a437b9be70026c8ba11fa71464ca58ad9c7a940ddb8a061c
-
SHA512
88721133092c6d18579cedb0104aeb4b085ebef2a7ebd79eb4dc6ecd4da67544adf63160355f704a909d11fd9ba1df8f3be3a777915ee285974a2b957eade819
-
SSDEEP
1536:gUzkcx4VHsC0SPMVO07RhCIsH1bP/NEhRQzcSLVclN:gUwcx4GfSPMVTNh4H1bPUQDBY
Malware Config
Extracted
asyncrat
Venom RAT v6.0.3 - Cracked By ReverseLabs
Default
127.0.0.1:4449
65.21.8.16:4449
frztevozbilaw
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
virus.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ