Behavioral task
behavioral1
Sample
2872-6-0x00000000000C0000-0x0000000000434000-memory.exe
Resource
win7-20230831-en
General
-
Target
2872-6-0x00000000000C0000-0x0000000000434000-memory.dmp
-
Size
3.5MB
-
MD5
c808cbcac3ced77aef7fe1cf0310023b
-
SHA1
c2895b6cd9b93cdaba0d6737c330f1d5e2856825
-
SHA256
c9a116a5e7265ef2bcf97b4ad483c0712664bb767a7291c0a4b7115c0e237828
-
SHA512
59d47d530516c6dc3bd0e1eb511fb359a90ef7982d81fc1bd82a6ef975a33a1b00e60b8cda3b8799cec7c3673efa3fafb4cbd7cb5866e545efa57aef39b1eaa9
-
SSDEEP
49152:5w9RB17lkLN5Kj5YVGGw7m2KSxnJAx/Dsz2NAi4wbpL3lfueW2FR:69RB17ldj5Gd5eJAGzyAi4wNLoER
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
asdaf1231~~AQsdвфыау ~!|}{?>:"
-
delay
1
-
install
true
-
install_file
mdconfig_01.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/pdRjLLjy
Signatures
Files
-
2872-6-0x00000000000C0000-0x0000000000434000-memory.dmp.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE