Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20231020-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
40dff8edca9726b431ba2e129a7a8d08
-
SHA1
6bf03fe573870c1d9b82c6c8efc536b3fc2a1c29
-
SHA256
8da187488f1aa9b42d39ae7d94c58b59a2208b9b9ae917f98ef2d4165487eeb2
-
SHA512
902ed2c12c6d4e28b1509582751bfebb0ac4397fe0afbca71b61fcc22d85c2e0c7ac57f02843d06ea22d6473ae4d71cb39cf7a2e2586202a80000830a0eebf35
-
SSDEEP
1536:HUCccxAYZCV6PMVGe9VdQuDI6H1bf/v2JgQzcaLVclN:HUzcxAS66PMVGe9VdQsH1bfXQLBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
10.8.18.158:5058
lpestozgyjzpmarsry
-
delay
1
-
install
true
-
install_file
ImageLoggerV2.exe
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ