Behavioral task
behavioral1
Sample
2684-36-0x0000000000ED0000-0x0000000000EF8000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2684-36-0x0000000000ED0000-0x0000000000EF8000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2684-36-0x0000000000ED0000-0x0000000000EF8000-memory.dmp
-
Size
160KB
-
MD5
c531710f9865d491e93bf57152a4355d
-
SHA1
0021fa587c4c1d14dddbf8c138dcb39f6ce2b1d0
-
SHA256
b7736c2fcbda75eb2a5d37e910ac3e31d158c26dccda958151a4371a842dcfef
-
SHA512
33af94e01cbcfe98daeecd9c95f6177549f0e1f81ef1c32330f14e43f77141d344e9dcd1af5fe87f4e522eaf6f69777b22cfb2d4297ed80dacf144e4d64bcae6
-
SSDEEP
3072:JUmcxV4x7PMVhrfqXH1bpLQJObeNT2YTlJZtrNtU9+/BY:Jlx7PMVRfqXVbh2NT2YTJ5NJ
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
103.38.236.46:4449
tjqysfvwksmagku
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
2684-36-0x0000000000ED0000-0x0000000000EF8000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ