Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240508-en
General
-
Target
Client.exe
-
Size
73KB
-
MD5
cb4a46c7872e2dcf94ab32c8cecaa56d
-
SHA1
8d72f37ea6375505c49cda356f4d74f0fcb411d0
-
SHA256
d815cf788ce433de6aed483aa10a7effb47ffbfadb75c671f8d05ff393e3bf6f
-
SHA512
468a95774064fe21455fdf4cd309654c1f6d322275b36acc12db29092e4e5af487b6bdf4b1de4aaf89cc54d90e3fd29b4347167f4da832cfc972ead89e0a878f
-
SSDEEP
1536:AULQcxcHNCHGPMV+e9VdQkhDIyH1bf/lfRQzcX3VclN:AUscxctcGPMV+e9VdQgH1bfNRQClY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
ZeroZen!!
172.98.68.22:53835
8d095cb0-e166-4fde-a0fd-d5867898c21b
-
delay
1
-
install
true
-
install_file
Antimalware Service Executable.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client.exe
Files
-
Client.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ