Behavioral task
behavioral1
Sample
1676-0-0x00000000003B0000-0x00000000003C8000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1676-0-0x00000000003B0000-0x00000000003C8000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1676-0-0x00000000003B0000-0x00000000003C8000-memory.dmp
-
Size
96KB
-
MD5
52b15d2647ef0437e48dd05efcc0b237
-
SHA1
cf5370514e7fb0d10166c1b038833a324f01654a
-
SHA256
b8388557c2679f437389875fd9abbdc44d02a1d83cb6829a772de9220f802b9b
-
SHA512
c0617b04114c6ab4149ed54ee282484ec2b7fb656c3fe04fde383cbf9e4dd267f963fcd7531412621731fa570fc00748d24df0062fe36ec2eec7a3aa50bb2a71
-
SSDEEP
1536:KUUPcxVteCW7PMVwXhONIgZ1bO/U9LvQzcoLVclN:KUmcxV4x7PMVwXaZ1bOc97QhBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
82.115.223.244:4449
fnpxcekdvtg
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
1676-0-0x00000000003B0000-0x00000000003C8000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ