Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20231129-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
954e50a0b0a0dee70a3eca8c37aee379
-
SHA1
94c2790588240e029520b79973e950349e3b9ecc
-
SHA256
733075dbd2ae8e332e1a5d74ed9b9102de71d34ca7cc528a2f78a4d3122ee9a7
-
SHA512
eb08a6d180d3577d9c21f90c437623ef0dbaed37d662440acb943169747a6c801fe57c33927e485851a051064d0ba12eeae95dd9412d8226cd452b6c788007d2
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/h+7QzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfg7QYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:80
jbfobjnqpznhvwq
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ