Overview
overview
10Static
static
10VenomRAT_v...us.dll
windows10-1703-x64
1VenomRAT_v...at.dll
windows10-1703-x64
1VenomRAT_v...ns.dll
windows10-1703-x64
1VenomRAT_v...er.dll
windows10-1703-x64
1VenomRAT_v...ry.dll
windows10-1703-x64
1VenomRAT_v...it.dll
windows10-1703-x64
1VenomRAT_v...ra.dll
windows10-1703-x64
1VenomRAT_v...op.dll
windows10-1703-x64
1VenomRAT_v...xy.dll
windows10-1703-x64
1VenomRAT_v...le.dll
windows10-1703-x64
1VenomRAT_v...ry.dll
windows10-1703-x64
1VenomRAT_v...er.dll
windows10-1703-x64
1VenomRAT_v...nc.exe
windows10-1703-x64
1VenomRAT_v...op.dll
windows10-1703-x64
1VenomRAT_v...op.dll
windows10-1703-x64
3VenomRAT_v...cs.dll
windows10-1703-x64
1VenomRAT_v...es.ps1
windows10-1703-x64
3VenomRAT_v...es.ps1
windows10-1703-x64
3VenomRAT_v...ny.exe
windows10-1703-x64
10VenomRAT_v...64.exe
windows10-1703-x64
10VenomRAT_v...86.exe
windows10-1703-x64
10VenomRAT_v...on.dll
windows10-1703-x64
1VenomRAT_v...ls.dll
windows10-1703-x64
1VenomRAT_v...er.exe
windows10-1703-x64
7VenomRAT_v...ib.dll
windows10-1703-x64
1VenomRAT_v...Ip.dll
windows10-1703-x64
1VenomRAT_v...ib.dll
windows10-1703-x64
1VenomRAT_v...in.url
windows10-1703-x64
1VenomRAT_v...ng.url
windows10-1703-x64
1VenomRAT_v...rd.dll
windows10-1703-x64
1VenomRAT_v...re.dll
windows10-1703-x64
1VenomRAT_v...et.dll
windows10-1703-x64
1Analysis
-
max time kernel
187s -
max time network
310s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16-05-2024 22:30
Behavioral task
behavioral1
Sample
VenomRAT_v6.0.3/Plugins/Miscellaneous.dll
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
VenomRAT_v6.0.3/Plugins/Netstat.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
VenomRAT_v6.0.3/Plugins/Options.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
VenomRAT_v6.0.3/Plugins/ProcessManager.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
VenomRAT_v6.0.3/Plugins/Recovery.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
VenomRAT_v6.0.3/Plugins/Regedit.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
VenomRAT_v6.0.3/Plugins/RemoteCamera.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
VenomRAT_v6.0.3/Plugins/RemoteDesktop.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
VenomRAT_v6.0.3/Plugins/ReverseProxy.dll
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
VenomRAT_v6.0.3/Plugins/SendFile.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
VenomRAT_v6.0.3/Plugins/SendMemory.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
VenomRAT_v6.0.3/Plugins/Stealer.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
VenomRAT_v6.0.3/Plugins/hvnc.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
VenomRAT_v6.0.3/Plugins/x64/SQLite.Interop.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
VenomRAT_v6.0.3/Plugins/x86/SQLite.Interop.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
VenomRAT_v6.0.3/SMDiagnostics.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
VenomRAT_v6.0.3/Server.Properties.Resources.ps1
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
VenomRAT_v6.0.3/Server.Properties.Resources.resources.ps1
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
VenomRAT_v6.0.3/Stub/ClientAny.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
VenomRAT_v6.0.3/Stub/Clientx64.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
VenomRAT_v6.0.3/Stub/Clientx86.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
VenomRAT_v6.0.3/System.IO.Compression.dll
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
VenomRAT_v6.0.3/System.ServiceModel.Internals.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
VenomRAT_v6.0.3/Venom RAT + HVNC + Stealer + Grabber.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
VenomRAT_v6.0.3/Vestris.ResourceLib.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
VenomRAT_v6.0.3/cGeoIp.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
VenomRAT_v6.0.3/dnlib.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
VenomRAT_v6.0.3/gbpast - Login.url
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
VenomRAT_v6.0.3/learn all kind of hacking.url
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
VenomRAT_v6.0.3/netstandard.dll
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
VenomRAT_v6.0.3/protobuf-net.Core.dll
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
VenomRAT_v6.0.3/protobuf-net.dll
Resource
win10-20240404-en
General
-
Target
VenomRAT_v6.0.3/Server.Properties.Resources.ps1
-
Size
11.6MB
-
MD5
24bb6bf569b7b8b8b2743f1b4ec138d9
-
SHA1
0ee96dead026dad2413cad1729c44da82e9aa0a8
-
SHA256
db0da3c4c367aa05193b918d91fc731ccdec0241532b02f544891547bac61976
-
SHA512
6dc0ed583a468ae2e649e6abca910f4f58ff7f0d3f0cf42effaf33b276ec520a2e6d37cd3a702a86265e537fdd570fcca5bd55cc049c8a7396ebee895101b71d
-
SSDEEP
196608:j7aIBhLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95UhS1nUzBPeXQt0Z:fT+P+Zw6NLIsFfskh1BmXG0Z
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 4136 powershell.exe Token: 33 5004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5004 AUDIODG.EXE
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\VenomRAT_v6.0.3\Server.Properties.Resources.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3801⤵
- Suspicious use of AdjustPrivilegeToken
PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a