General
-
Target
Client.exe
-
Size
74KB
-
MD5
d391c2564b4ee31ee871729300b9d45a
-
SHA1
06e35ad7a1421ff87dc835580ca05a04ec44eee9
-
SHA256
bc91ad4b9bcc091adbb209842c0ae0df3db1b25fe90a74aa1ea90f2c5c8e6b67
-
SHA512
381e5f9290a3915304572a553213f462e21c7323ac4fbb6209c8c297b30d0ca9f6e2f7ffd010875c043c62596ff66c287d2e660f8a4c1797c8de48dabc60a0aa
-
SSDEEP
1536:/5U1AcxqXPC/2PMVCe9VdQuDI6H1bf/h95vQzcOLVclN:BUKcxqfs2PMVCe9VdQsH1bfTdQHBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.19:42550
-
delay
1
-
install
true
-
install_file
test.exe
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ