Behavioral task
behavioral1
Sample
mjed.exe
Resource
win7-20240508-en
General
-
Target
mjed.exe
-
Size
74KB
-
MD5
7bb577c103edc28100f3a32a29a9eabb
-
SHA1
6389f5a9960fba5505da7cb23bc37eac03ac05d3
-
SHA256
312900ad4399386c95dba582e9ae951d3a4aee7028a52db8563ebf2e8866fd72
-
SHA512
e7f64f7ee58565620aad951e58c635d04a614e0fb5ba8259db60c324d0d7df4cf45f21662060d1034328f13a5618687f2d3a996daa6450ede83c13421c0259a2
-
SSDEEP
1536:8UUPcxVteCW7PMV6qFVtIP11bM/2vT9QzcBLVclN:8UmcxV4x7PMV9V811bMevT9QYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:53068
jbfobjnqpznhvwq
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
mjed.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ