General
-
Target
06032024_0208_update.ps1
-
Size
11.3MB
-
Sample
240306-ckt4jsgb5w
-
MD5
b89be2490ecdbe22d71420b68f77661a
-
SHA1
d06d705393b5bd798c3c7b814b31e8f301c57b47
-
SHA256
47023614c069481b374496cf0029af51d5aee78d64dbe7004e3f57765e59d8bd
-
SHA512
bcc51f0f04e947582df60f49c75d6f3192adee1606cc8d88c087d3570b90e05ec71b00640704a3d3996a259ea16e9cf415b1c1711f6708d960a07c6934e1d399
-
SSDEEP
49152:PvP+yQI3XU83yr6gWyZQUQL2lsocu53GMqTUXIPN4:g
Static task
static1
Behavioral task
behavioral1
Sample
06032024_0208_update.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06032024_0208_update.ps1
Resource
win10v2004-20240226-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
vrnmmondays.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
06032024_0208_update.ps1
-
Size
11.3MB
-
MD5
b89be2490ecdbe22d71420b68f77661a
-
SHA1
d06d705393b5bd798c3c7b814b31e8f301c57b47
-
SHA256
47023614c069481b374496cf0029af51d5aee78d64dbe7004e3f57765e59d8bd
-
SHA512
bcc51f0f04e947582df60f49c75d6f3192adee1606cc8d88c087d3570b90e05ec71b00640704a3d3996a259ea16e9cf415b1c1711f6708d960a07c6934e1d399
-
SSDEEP
49152:PvP+yQI3XU83yr6gWyZQUQL2lsocu53GMqTUXIPN4:g
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-