Behavioral task
behavioral1
Sample
2976-448-0x00000000003B0000-0x00000000003C8000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2976-448-0x00000000003B0000-0x00000000003C8000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2976-448-0x00000000003B0000-0x00000000003C8000-memory.dmp
-
Size
96KB
-
MD5
10fae0ccf6ef2c8ef8340d65ac443ced
-
SHA1
b08d465a6aa342b257c684cfbd9274dd4ee1dddc
-
SHA256
789102386970036298d12b0e35847b3cebe375f63618c60fd49ca3f1be405dee
-
SHA512
2a597c0303a5b52fbb144c4e9c1fdd6f4e319a543a5cc223b47feab0999cc5a019b0d99235cb364bd851c78e6af4b808e8e850ef90ae3a4edf4eb89d9b5e46ba
-
SSDEEP
1536:AUHAcxehvCw2PMVB7zOsMdIfH1b//RSTL/nnQzc77VclN:AUgcxe1/2PMVB7zOsMQH1b/ZILvQKxY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
89.23.100.93:4449
wtwuacmnipqdxxjbbul
-
delay
1
-
install
true
-
install_file
cmd.exe
-
install_folder
%Temp%
Signatures
Files
-
2976-448-0x00000000003B0000-0x00000000003C8000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ