Behavioral task
behavioral1
Sample
Client2.exe
Resource
win7-20240221-en
General
-
Target
Client2.exe
-
Size
74KB
-
MD5
8e970ceb744968a0bcb3b12e413eb988
-
SHA1
370a7b2e2041b4d2f1a49f61b5a1f7903c8dcd3d
-
SHA256
823d1f9cdc0e1cc743e8ee76147f2ac124e945ac9648762c2529916ade2f87cf
-
SHA512
3a1e0bf5a3a99eb4739697bf7a2063246a0327118f0017431e2b536741e1b1b8248a8405db2c91324a80f640e4966e45ff9f88774e6aa9c15f36eb66129f9bc2
-
SSDEEP
1536:mUme0cxFVTuCGbPMV/1yievkIXH1b1/LO5QzcmLVclN:mUm3cxFVaBbPMVtyzZH1b1jO5Q/BY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
94.156.8.65:8080
123
-
delay
1
-
install
true
-
install_file
123.exe
-
install_folder
%AppData%
Signatures
Files
-
Client2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ