Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240419-en
General
-
Target
Client.exe
-
Size
73KB
-
MD5
6f1f78860493838a3fa2c372c3778a12
-
SHA1
5bd61c53d05a446c5891e1ed99f2c8cda5620282
-
SHA256
d13572c8936657f5ce2087901cfa26eb541f3d2f1ba41879a613f042cc483311
-
SHA512
decd1bd418b7d18928a060d450a1a8f4354610de17050e202eb367ff7c5c5d520525cd070cf1a7d4798dbe7edc64e29e7373403f8406fe2e6d5029e1a0d83f57
-
SSDEEP
1536:k5U1AcxqXPC/2PMVCe9VdQkhDIyH1bf/J06gQzc33VclN:sUKcxqfs2PMVCe9VdQgH1bfBwQylY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
209.25.140.1:42550
-
delay
1
-
install
true
-
install_file
test.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client.exe
Files
-
Client.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ