Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231130-en
General
-
Target
tmp
-
Size
74KB
-
MD5
74bae7aac1e952c4aacda6e5861bdea5
-
SHA1
e5c8542cd384de64dd99b096ffdaa633e8f2edb6
-
SHA256
26c9a1df0b429d6dfe09dd2bc84a61eada354d0c27959c3f486c8d94c7dbc1f2
-
SHA512
b1a5b8930bc8e5917ad6a3b4535d8a972ccce18a46d51dfcc7650f76438499b73f24f5c7f9ee76e53546d96a75f0187ac6a2514fa00d5965324e521b1eb43260
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/64kQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfS4kQYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
103.161.112.130:4449
wwfmnfhzdxvizy
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
tmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ