Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp
-
Size
74KB
-
MD5
0e986c418dceb9a5d1051c662d0752eb
-
SHA1
9f0ce8a16945b938f94d38c4bc1f4e26309f6b1d
-
SHA256
52947b3c80698f3c29876913ade80265a06e7101af2794ce8cdb9feda597a97e
-
SHA512
55d1392e3d2ddac80e4e4a8ccc9ced9c64a3aaccf06fd6e908d86f08d61ce0b4937889544ff24e2c3d6abd08bb8acb0992fad94f38dac29eb1451160652d8350
-
SSDEEP
1536:gUUPcxVteCW7PMVwEh3kLuaIsH1bz84NHdQzcyLVclN:gUmcxV4x7PMVXfAH1bz59QjBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
181.41.200.226:4000
xvsbodwahoyy
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
tmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ