Behavioral task
behavioral1
Sample
2440-1-0x0000000000250000-0x0000000000268000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2440-1-0x0000000000250000-0x0000000000268000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2440-1-0x0000000000250000-0x0000000000268000-memory.dmp
-
Size
96KB
-
MD5
ac2111639111bfdcee2a5b08a9c1039b
-
SHA1
ad326950e6c6c1512618bbb99aa98a3bd876f988
-
SHA256
cb89432d2d40498ba1db3e729b4082487df92c60ad0c43cc33e680c103cc7145
-
SHA512
ddda66c8172ecc21cbe7ecc568761ecfa2c9678075c4cb1345ba1b9184c2f7fc92a9272b611419e76031fc8c0e4a52210fe7ba30d9813875cd2338b03b00053a
-
SSDEEP
1536:nUmDcxzxUC7kvPMVee9VdQuDI6H1bf/+5UtDQzcCLVclN:nUEcxzu7vPMVee9VdQsH1bfW52DQnBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
Default
91.103.252.215:4449
czzhqlpybaasnlh
-
delay
13
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
2440-1-0x0000000000250000-0x0000000000268000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ