Behavioral task
behavioral1
Sample
968-375-0x00000000005A0000-0x00000000005B8000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
968-375-0x00000000005A0000-0x00000000005B8000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
968-375-0x00000000005A0000-0x00000000005B8000-memory.dmp
-
Size
96KB
-
MD5
3877423b711d4ac586bb8e4a3137eff5
-
SHA1
0ba7b8237b0c5635f1aa7c585e31944685cd5804
-
SHA256
ae752d586160d7e1d4b2fc447313a07e891125b70d47419eff9197d690cae4cc
-
SHA512
2723ee2710c74a96b8242f0f9ad13f533074e0bfaece92732cedb88cdd9f34e9fb10a74246d99fe1354281586710ce737a817643bf337fd2e61ad6de279080fe
-
SSDEEP
1536:qhUZAcxjVLcoCJPPMVOe9VdQuDI6H1bf/GDXQzc87VclN:aUWcxjVLLCPPMVOe9VdQsH1bfqXQpxY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
89.23.100.93:4449
oonrejgwedvxwse
-
delay
1
-
install
true
-
install_file
calc.exe
-
install_folder
%AppData%
Signatures
Files
-
968-375-0x00000000005A0000-0x00000000005B8000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ