Behavioral task
behavioral1
Sample
2976-0-0x0000000000250000-0x0000000000268000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2976-0-0x0000000000250000-0x0000000000268000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2976-0-0x0000000000250000-0x0000000000268000-memory.dmp
-
Size
96KB
-
MD5
519d9175a81420553fe4be2dba5899c5
-
SHA1
39667a983a974e75458feb9214f542b9a86a56a1
-
SHA256
d48ce8e31beccb5b31fa78b30ed4b62ffc40b2ffcfe2580f040887271f03e3b0
-
SHA512
924d433ac00e0960e516f2f33182a5b2d312e2579dcf9ac2f1e686436fc87e08ee12129a33799be57e12602068539f3765103ff8aca01995e57b3d01f5921824
-
SSDEEP
1536:KUmDcxzxUC7kvPMVee9VdQuDI6H1bf/+5UtDQzcCLVclN:KUEcxzu7vPMVee9VdQsH1bfW52DQnBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
Default
91.103.252.215:4449
czzhqlpybaasnlh
-
delay
13
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
2976-0-0x0000000000250000-0x0000000000268000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ