Analysis
-
max time kernel
1793s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 08:37
Behavioral task
behavioral1
Sample
VenomRAT.exe
Resource
win10v2004-20240226-en
General
-
Target
VenomRAT.exe
-
Size
5.4MB
-
MD5
b0dab6cd0e9d35492253d0f52e141500
-
SHA1
0c8f2b5d5212c33aed8dae3aa63dc2cb77e3b33f
-
SHA256
e1e909014437724aba43b2aa8e47aa01e56d6d47f5f37d883000d5f42e763a4c
-
SHA512
2f656e396bc76656a33cc21e38bf55f811bbcb9dc19784298110ba0e86302055adfb891433b63a37ae9c8911e884974f5c2a6d5f5c6ad0d725aed2e0f30c82b4
-
SSDEEP
49152:WTiGhIjd1axByJUhitEbL4I+j9+qDKai8mnbqFt4048ZDYOfkCFZ+XYvgp2h3tUd:W/hNLOI2uKHKJgJ+B+t
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5428876226:AAFBchyLgjGmB_WG7TBXAtjIewC0an-KRm4
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Deletes itself 1 IoCs
Processes:
VenomRAT.exepid process 3012 VenomRAT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
VenomRAT.exedescription ioc process File opened (read-only) \??\F: VenomRAT.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 ip-api.com -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
VenomRAT.exepid process 3012 VenomRAT.exe 3012 VenomRAT.exe 3012 VenomRAT.exe 3012 VenomRAT.exe 3012 VenomRAT.exe 3012 VenomRAT.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
VenomRAT.exepid process 3012 VenomRAT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VenomRAT.exe"C:\Users\Admin\AppData\Local\Temp\VenomRAT.exe"1⤵
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:1584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3736 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5c47ff5df2bf2b4e88a116eab10b41a76
SHA1b1babaa8567ed5038b4a74700048a5cde86c78b2
SHA256bb7dbf02c6591b9f5df047211692daa6999f177e95b84c8fea69946d2fbd70b8
SHA51259aa78642ba7406c41219c11d5195ab8426682bfe4ed880c2415ad45c0128c230a641195e7997d0eb99033b44d3e652ec8ae038990c047d78b107c51399c7353
-
Filesize
1.2MB
MD5ebe0c31031d54bb10160fd43f5876046
SHA1b2a04c93896176a0fb7302e4a48a3324e5a73fb8
SHA256ab3534e36158497889bdd947391e5bfe380e17928c57d51137c4f36dce618d95
SHA512bc9bef8c213cf0b9e6123a12307126c2e782d506724706a4ffe5ad754a9925ab1e9ce666223f5993f31bb16515ef32f1c8109e88db43427a145f71474b65c2c8