Behavioral task
behavioral1
Sample
sdfsdfsdfsdf.exe
Resource
win7-20240221-en
General
-
Target
sdfsdfsdfsdf.exe
-
Size
74KB
-
MD5
a4de449e5b24149c769e0299590145c7
-
SHA1
ee6239b2c46e97452b3a78bdc121e7150d9e25a3
-
SHA256
f58aa4f1dfa8b0f79ffce2e807b08d42533cf3afde8bdbdd6177befef2603710
-
SHA512
4cb4fe39bac987150a2113246294dee0ccc40fb1d4402dafad6e61ea43a0c5e73b81235ef6fcaf882a38cafe4e5475d0d56e2dd4759eae11658630fb88bf7a86
-
SSDEEP
1536:aUUPcxVteCW7PMVyYyUwiOUImH1by/Qu52QzcqVVclN:aUmcxV4x7PMVyYyUwnIH1byZ52Qb3Y
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.18:43941
ejcvrydivsw
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
sdfsdfsdfsdf.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ