General
-
Target
pw.ps1
-
Size
13.0MB
-
Sample
240426-xjrl9ahh93
-
MD5
50eb02e67256948eb696df9762a46422
-
SHA1
2494e4466131091bf71caf26ff1aadf986e0acbc
-
SHA256
1b5cd42f4382ba1f47f3b6b4dd3e0cdf707eaf6a25494114126242f202b9f5cd
-
SHA512
e13e93e494631fa361f41ad13ed31d47bb20e3a03e5898fb39738508b943c0f8c5537c8c41b9cdbd522cdce997b3935abcf9ae972f0886283973ceab2ebc2d08
-
SSDEEP
49152:q+PeksaLvwswXlcCdoFcoc9EjBomkb6ri5yRb:
Static task
static1
Behavioral task
behavioral1
Sample
pw.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pw.ps1
Resource
win10v2004-20240419-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
undjsj.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
pw.ps1
-
Size
13.0MB
-
MD5
50eb02e67256948eb696df9762a46422
-
SHA1
2494e4466131091bf71caf26ff1aadf986e0acbc
-
SHA256
1b5cd42f4382ba1f47f3b6b4dd3e0cdf707eaf6a25494114126242f202b9f5cd
-
SHA512
e13e93e494631fa361f41ad13ed31d47bb20e3a03e5898fb39738508b943c0f8c5537c8c41b9cdbd522cdce997b3935abcf9ae972f0886283973ceab2ebc2d08
-
SSDEEP
49152:q+PeksaLvwswXlcCdoFcoc9EjBomkb6ri5yRb:
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-