General
-
Target
s.exe
-
Size
63KB
-
Sample
240124-qwg51sbfcj
-
MD5
8f848b445bc31328898efbc7b1391c2a
-
SHA1
6dd65810893dee711a9e836c051295c6c7c98a9f
-
SHA256
91d39b84ccc4d6fdfa0ec052e404a5aa6f153ccdd861f28b2ab22944bc45a6da
-
SHA512
f1d662dc672fd7eb36933173b3cce7cd00daf13fcbeea23cc53c1da37f0cbd5f12d94ea6b22c4bc6ca58cfd36161f5451c3327bad2ffa0d987beb7853dee1e8f
-
SSDEEP
1536:EJel10tnDY3ha7bky1LAu/Gbb9w5X5kG+DpqKmY7:EJel10tnIha7bkyFGbb9SXQgz
Behavioral task
behavioral1
Sample
s.exe
Resource
win11-20231215-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:4449
176.150.69.221:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
e.exe
-
install_folder
%AppData%
Targets
-
-
Target
s.exe
-
Size
63KB
-
MD5
8f848b445bc31328898efbc7b1391c2a
-
SHA1
6dd65810893dee711a9e836c051295c6c7c98a9f
-
SHA256
91d39b84ccc4d6fdfa0ec052e404a5aa6f153ccdd861f28b2ab22944bc45a6da
-
SHA512
f1d662dc672fd7eb36933173b3cce7cd00daf13fcbeea23cc53c1da37f0cbd5f12d94ea6b22c4bc6ca58cfd36161f5451c3327bad2ffa0d987beb7853dee1e8f
-
SSDEEP
1536:EJel10tnDY3ha7bky1LAu/Gbb9w5X5kG+DpqKmY7:EJel10tnIha7bkyFGbb9SXQgz
Score10/10-
Async RAT payload
-
Executes dropped EXE
-