General

  • Target

    Venom 2.8 FINAL.zip

  • Size

    32.1MB

  • Sample

    240404-pag3fsfd36

  • MD5

    ff9a466df66361d030a6d61603b9738c

  • SHA1

    65e8a96841a329335aacc92d3d2c4fb60f03ad25

  • SHA256

    bace996d520f87342bf7ed61cef02607efcda1139d887de18306458eee56d4f8

  • SHA512

    d5e2068d3d8b907d8a611beb14390881f71012727ea0dc6395547f3ce43a041a7d239b47bd982aeb9ef7a7583b8b3c37cd91e9c75bf0269d3e82055000491d5e

  • SSDEEP

    786432:Nu1uHxf8nFomn63ou9oRB8Tgq6QVxAWOjh:uuHxf8nFomAo5b8TgqSWOjh

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Targets

    • Target

      Venom 2.8 CRACKED - FINAL/VenomRemote_Cracked.exe

    • Size

      38.5MB

    • MD5

      83626a159e3399dc2bec680220ba8969

    • SHA1

      c8fb91953976291310ddc645e2b9275277c57ec2

    • SHA256

      0e59d8a36fc73b40178732c2e9dec9143ceb3dfd590547221dbce65983042141

    • SHA512

      6640d88a9aff7507d8372317e34422aa7a493d00194c945c2292d20445e0e0b6a0004ef90e8c263fe683b352292d89b28bdcb5fa4135be4333d4ef7076119f09

    • SSDEEP

      393216:OFdlmXJTD1jJTDQMvfOjmM27kv1Bx0bQox/UlGkNCoIZZJTD2Mm1Zg6YH3mH1gfB:GLxMvDUjCbQa/O11t1Zg6kmH1gEEE

    Score
    7/10
    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

MITRE ATT&CK Matrix

Tasks